Skip to main content

Recent Trends in Text Steganography with Experimental Study

  • Chapter
  • First Online:
Handbook of Computer Networks and Cyber Security

Abstract

There have been pressing needs for securing a document and its content, either in electronic form or printed form. This is because counterfeiting and forgeries are extremely widespread all over the world, causing tremendous damage to individuals, industries, societies, and even national security. This is the main reason why people think about to protect their work and prevent such illicit activities. Because of these various methods like cryptography, steganography, and coding have been used. Steganography is the best-suited technique that allows user to hide a message in another message (cover media). Most of steganography research uses cover media as pictures, video clips, and sounds. However, text steganography is not normally preferred due to the difficulty in finding redundant bits in text document. To embed information inside a document, its characteristics have to be altered. These characteristics can be either insertion of spaces or non-displayed characters, deliberate misspellings distributed throughout the text, resizing of fonts, and so on. But due to slight change in the document it will be visible to the third party or attacker. To overcome this problem there is a need to alter the document in such a way that it will not visible to the human eyes yet it is possible to decode it with computer. The present chapter highlights the technique for reconstruction of the printed document using text-based steganography. This technique may be used if the original document (e.g., bank checks, legal documents, and certificates) is torn out and the important information is lost. Extracting the information from the torn part of the document and recreating the document will help in regaining the lost information. This method will first extract the text information present in the document and encode it into symbols. Then embed these symbols into the document multiple numbers of times without affecting the integrity of the document. For recreating the document, the hard copy of the document can be processed in order to retrieve the embedded information. Thus, the information is regained from the original printed text document. This method will help in reconstruction of printed document from its part or whole.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Popa, R. (1998). An analysis of steganographic techniques. The Politehnica University of Timisoara, Faculty of Automatics and Computers, Department of Computer Science and Software Engineering.

    Google Scholar 

  2. Kahn, D. (1996, May). The history of steganography. In International Workshop on Information Hiding (pp. 1–5). Berlin: Springer.

    Google Scholar 

  3. The Science of Secrecy, Steganography. Last visited May 6, 2009, from http://www.arch.columbia.edu/DDL/cad/A4S13

  4. Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3.4), 313–336.

    Article  Google Scholar 

  5. Johnson, N. (2009). Steganography. George Meson University. Last visited May 4, 2009, from http://patriot.net/~johnson/html/neil/stegdoc

  6. Rabah, K. (2004). Steganography-the art of hiding data. Information Technology Journal, 3(3), 245–269.

    Article  MathSciNet  Google Scholar 

  7. Alattar, A. M., & Alattar, O. M. (2004, June). Watermarking electronic text documents containing justified paragraphs and irregular line spacing. In Security, Steganography, and Watermarking of Multimedia Contents VI (Vol. 5306, pp. 685–696). International Society for Optics and Photonics.

    Google Scholar 

  8. Bhaya, W., Rahma, A. M., & Al-nasrawi, D. (2013). Text steganography based on font type in MS-Word documents.

    Google Scholar 

  9. Odeh, A., Elleithy, K., & Faezipour, M. (2013, May). Steganography in Arabic text using Kashida variation algorithm (KVA). In 2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT) (pp. 1–6). IEEE.

    Google Scholar 

  10. Kumar, K. A., & Pabboju, S. (2018). An optimized text steganography approach using differently spelt English words. International Journal of Pure and Applied Mathematics, 118(19), 2113–2125.

    Google Scholar 

  11. Mandal, K. K., Koley, S., & Mondal, S. (2018). Number system oriented text steganography in English language for short messages: A decimal approach. In Intelligent Computing and Information and Communication (pp. 183–193). Singapore: Springer.

    Chapter  Google Scholar 

  12. Khairullah, M., & Ratul, M. A. S. (2018). Steganography in Bengali unicode text. SUST Journal of Science and Technology.

    Google Scholar 

  13. Ahmadoh, E. M., & Gutub, A. A. A. (2015). Utilization of two diacritics for Arabic text steganography to enhance performance. Lecture Notes on Information Theory, 3(1), 42.

    Article  Google Scholar 

  14. Al-Nofaie, S., Fattani, M., & Gutub, A. A. A. (2016, February). Capacity improved Arabic text steganography technique utilizing ‘kashida’ with whitespaces. In The 3rd International Conference on Mathematical Sciences and Computer Engineering (ICMSCE2016) (pp. 38–44).

    Google Scholar 

  15. Por, L. Y., Wong, K., & Chee, K. O. (2012). UniSpaCh: A text-based data hiding method using Unicode space characters. Journal of Systems and Software, 85(5), 1075–1082.

    Article  Google Scholar 

  16. Kumar, R., Malik, A., Singh, S., Kumar, B., & Chand, S. (2016, April). A space based reversible high capacity text steganography scheme using font type and style. In Computing, Communication and Automation (ICCCA) (pp. 1090–1094). IEEE.

    Google Scholar 

  17. Huang, D., & Yan, H. (2001). Interword distance changes represented by sine waves for watermarking text images. IEEE Transactions on Circuits and Systems for Video Technology, 11(12), 1237–1245.

    Article  Google Scholar 

  18. Roy, S., & Venkateswaran, P. (2013). A text based steganography technique with Indian root. Procedia Technology, 10, 167–171.

    Article  Google Scholar 

  19. Banerjee, I., Bhattacharyya, S., & Sanyal, G. (2012). A procedure of text steganography using Indian regional language. International Journal of Computer Network and Information Security, 4(8), 65.

    Article  Google Scholar 

  20. Vidhya, P. M., & Paul, V. (2015). A method for text steganography using Malayalam text. Procedia Computer Science, 46, 524–531.

    Article  Google Scholar 

  21. Yang, Z., Guo, X., Chen, Z., Huang, Y., & Zhang, Y. J. (2018). RNN-Stega: Linguistic steganography based on recurrent neural networks. IEEE Transactions on Information Forensics and Security, 14, 1280.

    Article  Google Scholar 

  22. Xiang, L., Wu, W., Li, X., & Yang, C. (2018). A linguistic steganography based on word indexing compression and candidate selection. Multimedia Tools and Applications, 77, 28969.

    Article  Google Scholar 

  23. Zhang, L., Wang, S., Gan, W., Tang, C., Zhang, J., & Liang, H. (2018, June). SLIDE: An efficient secure linguistic steganography detection protocol. In International Conference on Cloud Computing and Security (pp. 298–309). Cham: Springer.

    Google Scholar 

  24. Mandal, K. K., Koley, S., & Mondal, S. (2018). Number system oriented text steganography in English language for short messages: A decimal approach. In Intelligent Computing and Information and Communication (pp. 183–193). Singapore: Springer.

    Google Scholar 

  25. Naqvi, N., Abbasi, A. T., Hussain, R., Khan, M. A., & Ahmad, B. (2018). Multilayer partially homomorphic encryption text steganography (MLPHE-TS): A zero steganography approach. Wireless Personal Communications, 103, 1563–1585.

    Article  Google Scholar 

  26. Kaur, A., Kaur, S., & Sethi, G. (2018). A study on text based steganography using email platform and color mapping. International Journal of Computer (IJC), 29(1), 1–12.

    Google Scholar 

  27. Ditta, A., Yongquan, C., Azeem, M., Rana, K. G., Yu, H., & Memon, M. Q. (2018). Information hiding: Arabic text steganography by using Unicode characters to hide secret data. International Journal of Electronic Security and Digital Forensics, 10(1), 61–78.

    Article  Google Scholar 

  28. Sanghi, A., Chaudhary, S., & Dave, M. (2018). Enhance the data security in cloud computing by text steganography. In Smart Trends in Systems, Security and Sustainability (pp. 241–248). Singapore: Springer.

    Google Scholar 

  29. Siahaan, R. F., Zarlis, M., & Nasution, B. B. (2018, September). Performance analysis of steganography alphanumeric text in the text based on Indonesian linguistic. In IOP Conference Series: Materials Science and Engineering (Vol. 420, No. 1, p. 012123). IOP Publishing.

    Google Scholar 

  30. Zuo, X., Hu, H., Zhang, W., & Yu, N. (2018, June). Text semantic steganalysis based on word embedding. In International Conference on Cloud Computing and Security (pp. 485–495). Cham: Springer.

    Google Scholar 

  31. Fateh, M., & Rezvani, M. (2018). An email-based high capacity text steganography using repeating characters. International Journal of Computers and Applications, 1–7. https://doi.org/10.1080/1206212x.2018.1517713

  32. Xiang, L., Li, Y., Hao, W., Yang, P., & Shen, X. (2018). Reversible natural language watermarking using synonym substitution and arithmetic coding. Computers, Materials and Continua, 55(3), 541–559.

    Google Scholar 

  33. Ashraf, Z., Roy, M. L., Muhuri, P. K., & Lohani, Q. D. (2018, July). A novel image steganography approach based on interval type-2 fuzzy similarity. In 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (pp. 1–8). IEEE.

    Google Scholar 

  34. Bhushan, B., & Sahoo, G. (2017). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98(2), 2037–2077. https://doi.org/10.1007/s11277-017-4962-0.

    Article  Google Scholar 

  35. Kumar, R., Chandra, P., & Hanmandlu, M. (2016). A robust fingerprint matching system using orientation features. Journal of Information Processing Systems, 12(1), 83–99.

    Google Scholar 

  36. Kumar, R., Chandra, P., & Hanmandlu, M. (2012). Fingerprint matching based on orientation feature. In Advanced Materials Research (Vol. 403, pp. 888–894). Trans Tech Publications.

    Google Scholar 

  37. Gupta, B. B., & Samir, K. B. (2013). A DWT method for image steganography. International Journal of Advanced Research in Computer Science and Software Engineering, 3, 983.

    Google Scholar 

  38. Shi, S., Qi, Y., & Huang, Y. (2016, December). An approach to text steganography based on search in internet. In Computer Symposium (ICS), 2016 International (pp. 227–232). IEEE.

    Google Scholar 

  39. Kumar, R., Chandra, P., & Hanmandlu, M. (2013, December). Local directional pattern (LDP) based fingerprint matching using SLFNN. In 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013) (pp. 493–498). IEEE.

    Google Scholar 

  40. Sinha, P., Rai, A. K., Jha, V. K., Bhushan, B. (2007, July) Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. In International Conference on Signal Processing and Communication - ICSPC'17, Coimbatore, Tamil Nadu, India.

    Google Scholar 

  41. Bennett, K. (2004). Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text.

    Google Scholar 

  42. Al-Hamami, A. H., & Al-Shamkhy, R. A. Using natural features of letters in text information hiding.

    Google Scholar 

  43. Huang, S., & Wu, J. K. (2007). Optical watermarking for printed document authentication. IEEE Transactions on Information Forensics and Security, 2(2), 164–173.

    Article  Google Scholar 

  44. Liu, T. Y., & Tsai, W. H. (2007). A new steganographic method for data hiding in Microsoft word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security, 2(1), 24–30.

    Article  Google Scholar 

  45. Shirali-Shahreza, M. (2008, February). Text steganography by changing words spelling. In 10th International Conference on Advanced Communication Technology, 2008. ICACT 2008. (Vol. 3, pp. 1912–1913). IEEE.

    Google Scholar 

  46. Gupta Banik, B., & Bandyopadhyay, S. K. (2018). Novel text steganography using natural language processing and part-of-speech tagging. IETE Journal of Research, 1–12. https://doi.org/10.1080/03772063.2018.1491807

  47. Khairullah, M. (2018). A novel steganography method using transliteration of Bengali text. Journal of King Saud University - Computer and Information Sciences.

    Google Scholar 

  48. Samphaiboon, N., & Dailey, M. N. (2008, May). Steganography in Thai text. In 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, 2008. ECTI-CON 2008. (Vol. 1, pp. 133–136). IEEE.

    Google Scholar 

  49. Al-Azawi, A. F., & Fadhil, M. A. (2010). Arabic text steganography using kashida extensions with Huffman code. Journal of Applied Sciences, 10, 436–439.

    Article  Google Scholar 

  50. Yang, B., et al. (2011). Steganography in MS Excel document using text-rotation technique. Information Technology Journal, 10(4), 889–893.

    Article  Google Scholar 

  51. Shirali-Shahreza, M. H., & Shirali-Shahreza, M. (2006, July). A new approach to Persian/Arabic text steganography. In 5th IEEE/ACIS International Conference on Computer and Information Science, 2006 and 2006 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse. ICIS-COMSAR 2006 (pp. 310–315). IEEE.

    Google Scholar 

  52. Gutub, A., & Fattani, M. (2007). A novel Arabic text steganography method using letter points and extensions.

    Google Scholar 

  53. Chaudhary, S., Dave, M., Sanghi, A., & Sidh, H. (2018). Indian script encoding technique (ISET): A Hindi text steganography approach. In Information and Communication Technology for Sustainable Development (pp. 393–401). Singapore: Springer.

    Google Scholar 

  54. Yang, Z., Zhang, P., Jiang, M., Huang, Y., & Zhang, Y. J. (2018, June). RITS: Real-time interactive text steganography based on automatic dialogue model. In International Conference on Cloud Computing and Security (pp. 253–264). Cham: Springer.

    Google Scholar 

  55. Ahvanooey, M. T., Li, Q., Hou, J., Mazraeh, H. D., & Zhang, J. (2018). AITSteg: An innovative text steganography technique for hidden transmission of text message via social media. IEEE Access, 6, 65981.

    Article  Google Scholar 

  56. Fateh, M., & Rezvani, M. (2018). An email-based high capacity text steganography using repeating characters. International Journal of Computers and Applications, 1–7. https://doi.org/10.1080/1206212x.2018.1517713

  57. Bala, B., Kamboj, L., & Luthra, P. (2018). Secure file storage in cloud computing using hybrid cryptography algorithm. International Journal of Advanced Research in Computer Science, 9(2), 773.

    Article  Google Scholar 

  58. Walke, A., Bhanushali, J., Rajgor, A., & Jain, J. (2018). Enhanced password processing scheme using visual cryptography and steganography. International Journal on Recent and Innovation Trends in Computing and Communication, 6(4), 35–37.

    Google Scholar 

  59. Baawi, S. S., Mokhtar, M. R., & Sulaiman, R. (2018, June). Enhancement of text steganography technique using Lempel-Ziv-Welch Algorithm and two-letter word technique. In International Conference of Reliable Information and Communication Technology (pp. 525–537). Cham: Springer.

    Google Scholar 

  60. Din, R., Utama, S., Hanizan, S. H., Hilal, M. M., Hanif, M. A., Zulhazlin, A., & Fazali, G. M. (2018). Evaluating the feature-based technique of text steganography based on capacity and time processing parameters. Advanced Science Letters, 24(10), 7355–7359.

    Article  Google Scholar 

  61. Wu, Y., Chen, X., & Sun, X. (2018). Coverless steganography based on English texts using binary tags protocol. Journal of Internet Technology, 19(2), 599–606.

    Google Scholar 

  62. Azeem, M., Yongquan, C., Ditta, A., Rana, K. G., & Rajpoot, F. A. (2018). Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters. International Journal of Information and Computer Security, 10(4), 437–453.

    Article  Google Scholar 

  63. Taha, A., Hammad, A. S., & Selim, M. M. (2018). A high capacity algorithm for information hiding in Arabic text. Journal of King Saud University-Computer and Information Sciences.

    Google Scholar 

  64. Hu, H., Zuo, X., Zhang, W., & Yu, N. (2018, June). Covert communication by exploring statistical and linguistical distortion in text. In International Conference on Cloud Computing and Security (pp. 288–301). Cham: Springer.

    Google Scholar 

  65. Kamat, S. D., Patil, S. S., & Mali, A. S. (2018). Implementation of steganographic model using inverted LSB insertion. International Journal of Engineering and Management Research (IJEMR), 8(4), 59–62.

    Google Scholar 

  66. Majumder, A., & Changder, S. (2013). A novel approach for text steganography: Generating text summary using reflection symmetry. Procedia Technology, 10, 112–120.

    Article  Google Scholar 

  67. Kim, Y. W., Moon, K. A., & Oh, I. S. (2003, August). A text watermarking algorithm based on word classification and inter-word space statistics. In ICDAR (p. 775). IEEE.

    Google Scholar 

  68. Niimi, M., Minewaki, S., Noda, H., & Kawaguchi, E. (2003, August). A framework of text-based steganography using SD-form semantics model. In Pacific Rim Workshop on Digital Steganography (pp. 3–4).

    Google Scholar 

  69. Memon, J. A., Khowaja, K., & Kazi, H. (2008). Evaluation of steganography for Urdu/Arabic text. Journal of Theoretical and Applied Information Technology, 4(3), 232.

    Google Scholar 

  70. Zhong, S., Cheng, X., & Chen, T. (2007). Data hiding in a kind of PDF texts for secret communication. IJ Network Security, 4(1), 17–26.

    Google Scholar 

  71. Villán, R., Voloshynovskiy, S., Koval, O., Vila, J., Topak, E., Deguillaume, F., et al. (2006, February). Text data-hiding for digital and printed documents: Theoretical and practical considerations. In Security, Steganography, and Watermarking of Multimedia Contents VIII (Vol. 6072, p. 607212). International Society for Optics and Photonics.

    Google Scholar 

  72. Moerland, T. (2003, May 15). Steganography and steganalysis. Last visited May 1, 2009, from www.liacs.nl/home/tmoerlan/privtech.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kumar, R., Singh, H. (2020). Recent Trends in Text Steganography with Experimental Study. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics