Abstract
In this study, capacity and security issues of text steganography have been considered by proposing a compression based approach. Because of using textual data in steganography, firstly, the employed data compression algorithm has to be lossless. Accordingly, Huffmann coding has been chosen due to its frequent use in the literature and significant compression ratio. Besides, the proposed method constructs and uses stego-keys in order to increase security. Secret information has been hidden in the chosen text from the previously constructed text base that consists of naturally generated texts. Email has been chosen as communication channel between the two parties, so the stego cover has been arranged as a forward mail platform. As the result of performed experiments, average capacity has been computed as 7.962 % for the secret message with 300 characters (or 300∙8 bits). Finally, comparison of the proposed method with the other contemporary methods in the literature has been carried out in Section 5.
Similar content being viewed by others
References
Al-Bahadili H (2008) A novel lossless data compression scheme based on the error correcting Hamming codes. Comput Math Appl 56(1):143–150
Bailey K, Curran K (2006) An evaluation of image based steganography methods using visual inspection and automated detection techniques. Multimed Tool Appl 30(1):55–58
Chang C, Kieu TD (2010) A reversible data hiding scheme using complementary embedding strategy. Inf Sci 180(16):3045–3058
Chapman M, Davida G (1997) Hiding the hidden: a software system for concealing cipher text as innocuous text. In: The proceedings of the international conference on information and communications security. Lecture notes in computer science, vol 1334. Springer, Beijing, pp 335–345
Chapman M, Davida GI (2001) A practical and effective approach to largescale automated linguistic steganography. In: Proceedings of the Information Security Conference (ISC’01), lecture notes in computer science, vol 2200. Springer, Malaga, pp 156–165
Chapman M, Davida GI (2002) Plausible deniability using automated linguistic steganography. In: Davida G, Frankel Y (eds) International Conference on Infrastructure Security (InfraSec’02). Lecture notes in computer science, vol 2437. Springer, Berlin, pp 276–287
Desoky A (2009) Listega: list-based steganography methodology. Int J Inf Secur 8(4):247–261
Easton T, Gary Parker R (2001) On completing latin squares. Discret Appl Math 113(2–3):167–181
Galambos G, Bekesi J (2002) Data Compression: Theory and Techniques. Department of Informatics, Teacher’s Training College, Database and Data Communication Network Systems, Vol. 1, Copyright 2002, Elsevier Science (USA)
Gutub A, Fattani M (2007) A novel Arabic text steganography method using letter points and extensions. WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE), Vienna, pp 28–31
Jun L, Tong W, Daxin L (2011) Research on ordinal properties in combinatorics coding method. J Comput 6(1):51–58
Lee IS, Tsai WH (2010) A new approach to covert communication via PDF files. Signal Process 90(2):557–565
Liang JY, Chen CS, Huang CH, Liu L (2008) Lossless compression of medical images using Hilbert space-filling curves. Comp Med Imag Graph 32(3):174–182
Liu Y, Wu H, Yu S (2011) Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map. Multimed Tool Appl 52(2–3):263–276
Lou D, Wu N, Wang C, Lin Z, Tsai CS (2010) A novel adaptive steganography based on local complexity and human vision sensitivity. J Syst Softw 83(7):1236–1248
Maher K (1995) TEXTO. <ftp://ftp.funet.fi/pub/crypt/steganography/texto.tar.gz>. Accessed 2 February 2012
Murphy B, Vogel C (2007) The syntax of concealment: reliable methods for plain text information hiding. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents
Nakagawa H, Sampei K, Matsumoto T, Kawaguchi S, Makino K, Murase I (2001) Text information hiding with preserved meaning—a case for Japanese documents, IPSJ Trans. 42 (9), pp. 2339–2350. Originally published in Japanese. A similar paper By the first author in English. http://www.r.dl.itc.u-tokyo.ac.jp/nakagawa/academic-res/finpri02.pdf. Accessed 4 June 2008
Por LY, Wong K, Chee KO (2012) UniSpaCh: a textbased data hiding method using unicode space characters. J Syst Softw. doi:10.1016/j.jss.2011.12.023
Ryabko B, Ryabko D (2011) Constructing perfect steganographic systems. Inf Comput 209(9):1223–1230
Samphaiboon N (2009) Steganography via running short text messages. Multimed Tool Appl 52(2–3):569–596
Satir E, Isik H (2012) A compression—based text steganography method. J Syst Softw 85(10):2385–2394
Shua Y, Liua L, Tianb W, Miaoa X (2011) Algorithm for information hiding in optional multi-text. Proced Eng 15:3936–3941
Stutsman R, Atallah M, Grothoff C, Grothoff K (2006) Lost in just the translation. In: Proceedings of the 2006 ACM symposium on applied computing, April 23–27. Dijon, France, pp 338–345
Sun XM, Luo G, Huang HJ (2004) Component-based digital watermarking of Chinese texts. In: Proceedings of the 3rd International Conference on Information Security, Shanghai, China, pp. 76–81
Topkara M, Topkara U, Atallah MJ (2007) Information hiding through errors: a confusing approach, in: Proceedings of SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, January 29-February 1
Wang Z, Chang C, Lin C, Li M (2009) A reversible information hiding scheme using left-right and up-down Chinese character representation. J Syst Softw 82:1362–1369
Wang ZH, Kieu TD, Chang CC, Li MC (2009) Emoticon-based Text Steganography in Chat. In: Proceedings of 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA 2009), Wuhan, China, Vol. 2, pp. 457–460
Wayner P (1992) Mimic functions. Cryptol XVI(3):193–214. doi:10.1080/0161-119291866883
Wayner P (2002) Disappearing cryptography, 2nd edn. Morgan Kaufmann, Menlo Park, pp 81–128
Winstein K (1999) Lexical steganography through adaptive modulation of the word choice hash. Secondary education at the IllinoisMathematics and Science Academy, January, http://alumni.imsa.edu/~keithw/tlex/lsteg.ps. Accessed 15 April 2008
Winstein K, Lexical steganography, http://alumni.imsa.edu/~keithw/tlex, Accessed 24 May 2012
Zaker N, Hamzeh A (2011) A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram. Multimed Tool Appl. doi:10.1007/s11042-010-0714-9
Author information
Authors and Affiliations
Corresponding author
Appendices
Annex I
Annex 2—Pseudo Codes for Embedding Phase
Annex 3—Pseudo Codes for Extracting Phase
Rights and permissions
About this article
Cite this article
Satir, E., Isik, H. A Huffman compression based text steganography method. Multimed Tools Appl 70, 2085–2110 (2014). https://doi.org/10.1007/s11042-012-1223-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-012-1223-9