Skip to main content
Log in

A Huffman compression based text steganography method

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this study, capacity and security issues of text steganography have been considered by proposing a compression based approach. Because of using textual data in steganography, firstly, the employed data compression algorithm has to be lossless. Accordingly, Huffmann coding has been chosen due to its frequent use in the literature and significant compression ratio. Besides, the proposed method constructs and uses stego-keys in order to increase security. Secret information has been hidden in the chosen text from the previously constructed text base that consists of naturally generated texts. Email has been chosen as communication channel between the two parties, so the stego cover has been arranged as a forward mail platform. As the result of performed experiments, average capacity has been computed as 7.962 % for the secret message with 300 characters (or 300∙8 bits). Finally, comparison of the proposed method with the other contemporary methods in the literature has been carried out in Section 5.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Al-Bahadili H (2008) A novel lossless data compression scheme based on the error correcting Hamming codes. Comput Math Appl 56(1):143–150

    Article  MATH  MathSciNet  Google Scholar 

  2. Bailey K, Curran K (2006) An evaluation of image based steganography methods using visual inspection and automated detection techniques. Multimed Tool Appl 30(1):55–58

    Article  Google Scholar 

  3. Chang C, Kieu TD (2010) A reversible data hiding scheme using complementary embedding strategy. Inf Sci 180(16):3045–3058

    Article  Google Scholar 

  4. Chapman M, Davida G (1997) Hiding the hidden: a software system for concealing cipher text as innocuous text. In: The proceedings of the international conference on information and communications security. Lecture notes in computer science, vol 1334. Springer, Beijing, pp 335–345

    Google Scholar 

  5. Chapman M, Davida GI (2001) A practical and effective approach to largescale automated linguistic steganography. In: Proceedings of the Information Security Conference (ISC’01), lecture notes in computer science, vol 2200. Springer, Malaga, pp 156–165

    Google Scholar 

  6. Chapman M, Davida GI (2002) Plausible deniability using automated linguistic steganography. In: Davida G, Frankel Y (eds) International Conference on Infrastructure Security (InfraSec’02). Lecture notes in computer science, vol 2437. Springer, Berlin, pp 276–287

    Google Scholar 

  7. Desoky A (2009) Listega: list-based steganography methodology. Int J Inf Secur 8(4):247–261

    Article  Google Scholar 

  8. Easton T, Gary Parker R (2001) On completing latin squares. Discret Appl Math 113(2–3):167–181

    Article  MATH  Google Scholar 

  9. Galambos G, Bekesi J (2002) Data Compression: Theory and Techniques. Department of Informatics, Teacher’s Training College, Database and Data Communication Network Systems, Vol. 1, Copyright 2002, Elsevier Science (USA)

  10. Gutub A, Fattani M (2007) A novel Arabic text steganography method using letter points and extensions. WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE), Vienna, pp 28–31

    Google Scholar 

  11. Jun L, Tong W, Daxin L (2011) Research on ordinal properties in combinatorics coding method. J Comput 6(1):51–58

    Google Scholar 

  12. Lee IS, Tsai WH (2010) A new approach to covert communication via PDF files. Signal Process 90(2):557–565

    Article  MATH  Google Scholar 

  13. Liang JY, Chen CS, Huang CH, Liu L (2008) Lossless compression of medical images using Hilbert space-filling curves. Comp Med Imag Graph 32(3):174–182

    Article  Google Scholar 

  14. Liu Y, Wu H, Yu S (2011) Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map. Multimed Tool Appl 52(2–3):263–276

    Article  Google Scholar 

  15. Lou D, Wu N, Wang C, Lin Z, Tsai CS (2010) A novel adaptive steganography based on local complexity and human vision sensitivity. J Syst Softw 83(7):1236–1248

    Article  Google Scholar 

  16. Maher K (1995) TEXTO. <ftp://ftp.funet.fi/pub/crypt/steganography/texto.tar.gz>. Accessed 2 February 2012

  17. Murphy B, Vogel C (2007) The syntax of concealment: reliable methods for plain text information hiding. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents

  18. Nakagawa H, Sampei K, Matsumoto T, Kawaguchi S, Makino K, Murase I (2001) Text information hiding with preserved meaning—a case for Japanese documents, IPSJ Trans. 42 (9), pp. 2339–2350. Originally published in Japanese. A similar paper By the first author in English. http://www.r.dl.itc.u-tokyo.ac.jp/nakagawa/academic-res/finpri02.pdf. Accessed 4 June 2008

  19. Por LY, Wong K, Chee KO (2012) UniSpaCh: a textbased data hiding method using unicode space characters. J Syst Softw. doi:10.1016/j.jss.2011.12.023

  20. Ryabko B, Ryabko D (2011) Constructing perfect steganographic systems. Inf Comput 209(9):1223–1230

    Article  MATH  MathSciNet  Google Scholar 

  21. Samphaiboon N (2009) Steganography via running short text messages. Multimed Tool Appl 52(2–3):569–596

    Google Scholar 

  22. Satir E, Isik H (2012) A compression—based text steganography method. J Syst Softw 85(10):2385–2394

    Article  Google Scholar 

  23. Shua Y, Liua L, Tianb W, Miaoa X (2011) Algorithm for information hiding in optional multi-text. Proced Eng 15:3936–3941

    Article  Google Scholar 

  24. Stutsman R, Atallah M, Grothoff C, Grothoff K (2006) Lost in just the translation. In: Proceedings of the 2006 ACM symposium on applied computing, April 23–27. Dijon, France, pp 338–345

    Chapter  Google Scholar 

  25. Sun XM, Luo G, Huang HJ (2004) Component-based digital watermarking of Chinese texts. In: Proceedings of the 3rd International Conference on Information Security, Shanghai, China, pp. 76–81

  26. Topkara M, Topkara U, Atallah MJ (2007) Information hiding through errors: a confusing approach, in: Proceedings of SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, January 29-February 1

  27. Wang Z, Chang C, Lin C, Li M (2009) A reversible information hiding scheme using left-right and up-down Chinese character representation. J Syst Softw 82:1362–1369

    Article  Google Scholar 

  28. Wang ZH, Kieu TD, Chang CC, Li MC (2009) Emoticon-based Text Steganography in Chat. In: Proceedings of 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA 2009), Wuhan, China, Vol. 2, pp. 457–460

  29. Wayner P (1992) Mimic functions. Cryptol XVI(3):193–214. doi:10.1080/0161-119291866883

    Article  MathSciNet  Google Scholar 

  30. Wayner P (2002) Disappearing cryptography, 2nd edn. Morgan Kaufmann, Menlo Park, pp 81–128

    Book  Google Scholar 

  31. Winstein K (1999) Lexical steganography through adaptive modulation of the word choice hash. Secondary education at the IllinoisMathematics and Science Academy, January, http://alumni.imsa.edu/~keithw/tlex/lsteg.ps. Accessed 15 April 2008

  32. Winstein K, Lexical steganography, http://alumni.imsa.edu/~keithw/tlex, Accessed 24 May 2012

  33. Zaker N, Hamzeh A (2011) A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram. Multimed Tool Appl. doi:10.1007/s11042-010-0714-9

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Esra Satir.

Appendices

Annex I

Table 4 Arranged Latin Square

Annex 2—Pseudo Codes for Embedding Phase

figure d

Annex 3—Pseudo Codes for Extracting Phase

figure e

Rights and permissions

Reprints and permissions

About this article

Cite this article

Satir, E., Isik, H. A Huffman compression based text steganography method. Multimed Tools Appl 70, 2085–2110 (2014). https://doi.org/10.1007/s11042-012-1223-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1223-9

Keywords

Navigation