Abstract
In today’s world internet has emerged as an information hub which besides facilitating data sharing has logically connected people across the globe via chat, email, video conferencing etc. This ease of communication, however, is linked with serious security concerns of confidentiality, integrity, and non-repudiation that need to be addressed for secure communication. Steganography, one of the subdivisions of information hiding field, is now preferably been used in conjunction with cryptography to provide a doubly layered security shield to cater for the aforementioned confidentiality concern. This paper elaborates on a novel algorithm evolved for hiding sensitive information, twice in capacity as compared to its counterparts, inside ASCII text document/file. Also, conversion of stego objects to portable document format (.pdf) or when saved as MS Word (.doc), and converse, does not result in loss of hidden information or perceptibility.
Similar content being viewed by others
References
Petitcolas, F.A.P.; Anderson, R.J.; Kuhn, M.G.: Information hiding—a survey. In: Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, vol. 87, no. 5, pp. 1062–1078 (1999)
Paul, S.: Cryptology: A Mathematician’s Quest for Making and Breaking the Code. Katholieke Universiteit Leuven, Department of ESAT/COSIC, Kasteelpark Arenberg 10, B{3001, Leuven-Heverlee, Belgium
http://www.usatoday.com/tech/columnist/2001/12/19/maney.htm, 12/19/2001—updated 09:30 AM ET, last accessed April 1, 2011 at 1353 PM, PST
Ganeshkumar, V.; Koggalage, R.L.W.: A Language Independent Algorithm to Send Secret Messages using Steganography. In: International Conference on Advances in ICT for Emerging Regions (ICTer) 978-1-4244-9042-4/10/$26.00 ©2010 IEEE
http://edition.cnn.com/TECH/computing/9907/06/1963.idg/index.html, Available, last accessed Dec 21, 2010 at 1653 PM, PST
Zöllner, J.; Federrath, H.; Klimant, H.; Pfitzmann, A.; Piotraschke, R.; Westfeld, A.; Wicke, G.; Wolf, G.: Modeling the security of steganographic systems. In: Proceedings of 2nd Workshop on Information Hiding: April 1998, Portland, LNCS 1525, Springer, pp. 345–355
Rafat, K.F.; Sher, M.: IST: Imorived Steganography for HTML, 9th European Conference on Information Warfare and Security Hosted by strategyinternational.org and the Department of Applied Informatics, University of Macedonia, Thessaloniki, Greece, 1–2 July 2010
Pfitzmann, B.: Information hiding terminology. In: Anderson, R. (ed.) Information Hiding, 1st International Workshop, vol. 1174 of Lecture Notes in Computer Science, pp. 347–350. Springer (1996)
Simmons, G.J.: The prisoners’ problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology: Proceedings of Crypto, vol. 83, pp. 51–67. Plenum Press (1984)
Kleiman, D.; Cardwell, K.; Clinton, T.; Cross, M.; Gregg, M.; Varsalone, J.: The Official CHFI Study Guide (Exam 312-49) for Computer Hacking Forensic Investigators, Published by: Syngress Publishing, Inc., Elsevier, Inc., 30 Corporate Drive, Burlington, MA 01803, Craig Wright
Kipper, G.: Investigator’s guide to steganography. Auerbach Publications © 2004 (240 p.), ISBN:0849324335
Shirali-Shahreza, M.H; Shirali-Shahreza, M.: A new synonym text steganography. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing 978-0-7695-3278-3/08 © 2008 IEEE
Shirali-Shahreza, M.: Text Steganography by Changing Words Spelling, ISBN 978-89-5519-136-3, Feb. 17–20, 2008 ICACT 2008
Sirali-Shahreza, M.; Shirali-Shahreza, M.H.: Text Steganography in SMS, 0-7695-3038-9/07 © 2007 IEEE. doi:10.1109/ICCIT.2007.100
Sirali-Shahreza, M.H.; Shirali-Shahreza, M.: Text Steganography in Chat, 1-4244-1007/07 © 2007 IEEE
Bender W., Gruhl D., Morimoto N., Lu A.: Techniques for data hiding. IBM Syst. J. 35(3, 4), 313–336 (1996)
Kessler, G.C.: An overview of steganography for the computer forensics examiner. Forensic Science Communications July 2004, vol. 6, no. 3. [Online] Available: http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004_03_research01.htm
Shirali Shahreza, M.: A new method for steganography in HTML files. In: Proceedings of IETA Computer, Information, and Systems Sciences, and Engineering, EIAE 2005, Springer, pp. 247–251 (2005)
Al-Hamami, A.H., Al-Hakeem, M.S.; Al-Hamami, M.A.: A proposed method to hide text inside HTML web page file [Online], Available: http://mohammad.iraq.ir/A%20prposed%20method%20to%20hide%20text%20inside%20html%20web%20page%20file.pdf (November 9, 2009)
Introduction to Deogol [Online], http://wandership.ca/projects/deogol/intro.html Available, last accessed (Nov 3, 2009)
Barilnik, S.S.; Minin, I.V.; Minin, O.V.: Adaptation of Text Steganographic Algorithm for HTML. ISSN −1815-3712 ISBN 978-5-7782-0752-3 (C) Novosibirsk State Technical University
Memon, A.G.; Khawaja, S.; Shah, A.: Steganography: a new horizon for safe communication through XML. J. Theor. Appl. Inf. Technol., Isra University, Hala Naka Road Hyderabad, Pakistan, ©2005–2008 JATIT
SHA-1, http://en.wikipedia.org/wiki/SHA-1, Available, last accessed (Oct 11, 2009)
English Letter Frequency count, http://en.wikipedia.org/wiki/SHA-1, Available, last accessed (Jan 12, 2007) 1
Available, http://www.david-kahn.com/book-david-kahn-code-codebreakers-cryptography.htm Available, last accessed (Jan 12, 2007)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rafat, K.F., Sher, M. Secure Digital Steganography for ASCII Text Documents. Arab J Sci Eng 38, 2079–2094 (2013). https://doi.org/10.1007/s13369-013-0574-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-013-0574-5