Skip to main content
Log in

Secure Digital Steganography for ASCII Text Documents

  • Research Article - Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

In today’s world internet has emerged as an information hub which besides facilitating data sharing has logically connected people across the globe via chat, email, video conferencing etc. This ease of communication, however, is linked with serious security concerns of confidentiality, integrity, and non-repudiation that need to be addressed for secure communication. Steganography, one of the subdivisions of information hiding field, is now preferably been used in conjunction with cryptography to provide a doubly layered security shield to cater for the aforementioned confidentiality concern. This paper elaborates on a novel algorithm evolved for hiding sensitive information, twice in capacity as compared to its counterparts, inside ASCII text document/file. Also, conversion of stego objects to portable document format (.pdf) or when saved as MS Word (.doc), and converse, does not result in loss of hidden information or perceptibility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Petitcolas, F.A.P.; Anderson, R.J.; Kuhn, M.G.: Information hiding—a survey. In: Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, vol. 87, no. 5, pp. 1062–1078 (1999)

  2. Paul, S.: Cryptology: A Mathematician’s Quest for Making and Breaking the Code. Katholieke Universiteit Leuven, Department of ESAT/COSIC, Kasteelpark Arenberg 10, B{3001, Leuven-Heverlee, Belgium

  3. http://www.usatoday.com/tech/columnist/2001/12/19/maney.htm, 12/19/2001—updated 09:30 AM ET, last accessed April 1, 2011 at 1353 PM, PST

  4. Ganeshkumar, V.; Koggalage, R.L.W.: A Language Independent Algorithm to Send Secret Messages using Steganography. In: International Conference on Advances in ICT for Emerging Regions (ICTer) 978-1-4244-9042-4/10/$26.00 ©2010 IEEE

  5. http://edition.cnn.com/TECH/computing/9907/06/1963.idg/index.html, Available, last accessed Dec 21, 2010 at 1653 PM, PST

  6. Zöllner, J.; Federrath, H.; Klimant, H.; Pfitzmann, A.; Piotraschke, R.; Westfeld, A.; Wicke, G.; Wolf, G.: Modeling the security of steganographic systems. In: Proceedings of 2nd Workshop on Information Hiding: April 1998, Portland, LNCS 1525, Springer, pp. 345–355

  7. Rafat, K.F.; Sher, M.: IST: Imorived Steganography for HTML, 9th European Conference on Information Warfare and Security Hosted by strategyinternational.org and the Department of Applied Informatics, University of Macedonia, Thessaloniki, Greece, 1–2 July 2010

  8. Pfitzmann, B.: Information hiding terminology. In: Anderson, R. (ed.) Information Hiding, 1st International Workshop, vol. 1174 of Lecture Notes in Computer Science, pp. 347–350. Springer (1996)

  9. Simmons, G.J.: The prisoners’ problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology: Proceedings of Crypto, vol. 83, pp. 51–67. Plenum Press (1984)

  10. Kleiman, D.; Cardwell, K.; Clinton, T.; Cross, M.; Gregg, M.; Varsalone, J.: The Official CHFI Study Guide (Exam 312-49) for Computer Hacking Forensic Investigators, Published by: Syngress Publishing, Inc., Elsevier, Inc., 30 Corporate Drive, Burlington, MA 01803, Craig Wright

  11. Kipper, G.: Investigator’s guide to steganography. Auerbach Publications © 2004 (240 p.), ISBN:0849324335

  12. Shirali-Shahreza, M.H; Shirali-Shahreza, M.: A new synonym text steganography. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing 978-0-7695-3278-3/08 © 2008 IEEE

  13. Shirali-Shahreza, M.: Text Steganography by Changing Words Spelling, ISBN 978-89-5519-136-3, Feb. 17–20, 2008 ICACT 2008

  14. Sirali-Shahreza, M.; Shirali-Shahreza, M.H.: Text Steganography in SMS, 0-7695-3038-9/07 © 2007 IEEE. doi:10.1109/ICCIT.2007.100

  15. Sirali-Shahreza, M.H.; Shirali-Shahreza, M.: Text Steganography in Chat, 1-4244-1007/07 © 2007 IEEE

  16. Bender W., Gruhl D., Morimoto N., Lu A.: Techniques for data hiding. IBM Syst. J. 35(3, 4), 313–336 (1996)

    Article  Google Scholar 

  17. Kessler, G.C.: An overview of steganography for the computer forensics examiner. Forensic Science Communications July 2004, vol. 6, no. 3. [Online] Available: http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004_03_research01.htm

  18. Shirali Shahreza, M.: A new method for steganography in HTML files. In: Proceedings of IETA Computer, Information, and Systems Sciences, and Engineering, EIAE 2005, Springer, pp. 247–251 (2005)

  19. Al-Hamami, A.H., Al-Hakeem, M.S.; Al-Hamami, M.A.: A proposed method to hide text inside HTML web page file [Online], Available: http://mohammad.iraq.ir/A%20prposed%20method%20to%20hide%20text%20inside%20html%20web%20page%20file.pdf (November 9, 2009)

  20. Introduction to Deogol [Online], http://wandership.ca/projects/deogol/intro.html Available, last accessed (Nov 3, 2009)

  21. Barilnik, S.S.; Minin, I.V.; Minin, O.V.: Adaptation of Text Steganographic Algorithm for HTML. ISSN −1815-3712 ISBN 978-5-7782-0752-3 (C) Novosibirsk State Technical University

  22. Memon, A.G.; Khawaja, S.; Shah, A.: Steganography: a new horizon for safe communication through XML. J. Theor. Appl. Inf. Technol., Isra University, Hala Naka Road Hyderabad, Pakistan, ©2005–2008 JATIT

  23. SHA-1, http://en.wikipedia.org/wiki/SHA-1, Available, last accessed (Oct 11, 2009)

  24. English Letter Frequency count, http://en.wikipedia.org/wiki/SHA-1, Available, last accessed (Jan 12, 2007) 1

  25. Available, http://www.david-kahn.com/book-david-kahn-code-codebreakers-cryptography.htm Available, last accessed (Jan 12, 2007)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khan Farhan Rafat.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Rafat, K.F., Sher, M. Secure Digital Steganography for ASCII Text Documents. Arab J Sci Eng 38, 2079–2094 (2013). https://doi.org/10.1007/s13369-013-0574-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-013-0574-5

Keywords

Navigation