Abstract
There have been pressing needs for securing a document and its content, either in electronic form or printed form. This is because counterfeiting and forgeries are extremely widespread all over the world, causing tremendous damage to individuals, industries, societies, and even national security. This is the main reason why people think about to protect their work and prevent such illicit activities. Because of these various methods like cryptography, steganography, and coding have been used. Steganography is the best-suited technique that allows user to hide a message in another message (cover media). Most of steganography research uses cover media as pictures, video clips, and sounds. However, text steganography is not normally preferred due to the difficulty in finding redundant bits in text document. To embed information inside a document, its characteristics have to be altered. These characteristics can be either insertion of spaces or non-displayed characters, deliberate misspellings distributed throughout the text, resizing of fonts, and so on. But due to slight change in the document it will be visible to the third party or attacker. To overcome this problem there is a need to alter the document in such a way that it will not visible to the human eyes yet it is possible to decode it with computer. The present chapter highlights the technique for reconstruction of the printed document using text-based steganography. This technique may be used if the original document (e.g., bank checks, legal documents, and certificates) is torn out and the important information is lost. Extracting the information from the torn part of the document and recreating the document will help in regaining the lost information. This method will first extract the text information present in the document and encode it into symbols. Then embed these symbols into the document multiple numbers of times without affecting the integrity of the document. For recreating the document, the hard copy of the document can be processed in order to retrieve the embedded information. Thus, the information is regained from the original printed text document. This method will help in reconstruction of printed document from its part or whole.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Popa, R. (1998). An analysis of steganographic techniques. The Politehnica University of Timisoara, Faculty of Automatics and Computers, Department of Computer Science and Software Engineering.
Kahn, D. (1996, May). The history of steganography. In International Workshop on Information Hiding (pp. 1–5). Berlin: Springer.
The Science of Secrecy, Steganography. Last visited May 6, 2009, from http://www.arch.columbia.edu/DDL/cad/A4S13
Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3.4), 313–336.
Johnson, N. (2009). Steganography. George Meson University. Last visited May 4, 2009, from http://patriot.net/~johnson/html/neil/stegdoc
Rabah, K. (2004). Steganography-the art of hiding data. Information Technology Journal, 3(3), 245–269.
Alattar, A. M., & Alattar, O. M. (2004, June). Watermarking electronic text documents containing justified paragraphs and irregular line spacing. In Security, Steganography, and Watermarking of Multimedia Contents VI (Vol. 5306, pp. 685–696). International Society for Optics and Photonics.
Bhaya, W., Rahma, A. M., & Al-nasrawi, D. (2013). Text steganography based on font type in MS-Word documents.
Odeh, A., Elleithy, K., & Faezipour, M. (2013, May). Steganography in Arabic text using Kashida variation algorithm (KVA). In 2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT) (pp. 1–6). IEEE.
Kumar, K. A., & Pabboju, S. (2018). An optimized text steganography approach using differently spelt English words. International Journal of Pure and Applied Mathematics, 118(19), 2113–2125.
Mandal, K. K., Koley, S., & Mondal, S. (2018). Number system oriented text steganography in English language for short messages: A decimal approach. In Intelligent Computing and Information and Communication (pp. 183–193). Singapore: Springer.
Khairullah, M., & Ratul, M. A. S. (2018). Steganography in Bengali unicode text. SUST Journal of Science and Technology.
Ahmadoh, E. M., & Gutub, A. A. A. (2015). Utilization of two diacritics for Arabic text steganography to enhance performance. Lecture Notes on Information Theory, 3(1), 42.
Al-Nofaie, S., Fattani, M., & Gutub, A. A. A. (2016, February). Capacity improved Arabic text steganography technique utilizing ‘kashida’ with whitespaces. In The 3rd International Conference on Mathematical Sciences and Computer Engineering (ICMSCE2016) (pp. 38–44).
Por, L. Y., Wong, K., & Chee, K. O. (2012). UniSpaCh: A text-based data hiding method using Unicode space characters. Journal of Systems and Software, 85(5), 1075–1082.
Kumar, R., Malik, A., Singh, S., Kumar, B., & Chand, S. (2016, April). A space based reversible high capacity text steganography scheme using font type and style. In Computing, Communication and Automation (ICCCA) (pp. 1090–1094). IEEE.
Huang, D., & Yan, H. (2001). Interword distance changes represented by sine waves for watermarking text images. IEEE Transactions on Circuits and Systems for Video Technology, 11(12), 1237–1245.
Roy, S., & Venkateswaran, P. (2013). A text based steganography technique with Indian root. Procedia Technology, 10, 167–171.
Banerjee, I., Bhattacharyya, S., & Sanyal, G. (2012). A procedure of text steganography using Indian regional language. International Journal of Computer Network and Information Security, 4(8), 65.
Vidhya, P. M., & Paul, V. (2015). A method for text steganography using Malayalam text. Procedia Computer Science, 46, 524–531.
Yang, Z., Guo, X., Chen, Z., Huang, Y., & Zhang, Y. J. (2018). RNN-Stega: Linguistic steganography based on recurrent neural networks. IEEE Transactions on Information Forensics and Security, 14, 1280.
Xiang, L., Wu, W., Li, X., & Yang, C. (2018). A linguistic steganography based on word indexing compression and candidate selection. Multimedia Tools and Applications, 77, 28969.
Zhang, L., Wang, S., Gan, W., Tang, C., Zhang, J., & Liang, H. (2018, June). SLIDE: An efficient secure linguistic steganography detection protocol. In International Conference on Cloud Computing and Security (pp. 298–309). Cham: Springer.
Mandal, K. K., Koley, S., & Mondal, S. (2018). Number system oriented text steganography in English language for short messages: A decimal approach. In Intelligent Computing and Information and Communication (pp. 183–193). Singapore: Springer.
Naqvi, N., Abbasi, A. T., Hussain, R., Khan, M. A., & Ahmad, B. (2018). Multilayer partially homomorphic encryption text steganography (MLPHE-TS): A zero steganography approach. Wireless Personal Communications, 103, 1563–1585.
Kaur, A., Kaur, S., & Sethi, G. (2018). A study on text based steganography using email platform and color mapping. International Journal of Computer (IJC), 29(1), 1–12.
Ditta, A., Yongquan, C., Azeem, M., Rana, K. G., Yu, H., & Memon, M. Q. (2018). Information hiding: Arabic text steganography by using Unicode characters to hide secret data. International Journal of Electronic Security and Digital Forensics, 10(1), 61–78.
Sanghi, A., Chaudhary, S., & Dave, M. (2018). Enhance the data security in cloud computing by text steganography. In Smart Trends in Systems, Security and Sustainability (pp. 241–248). Singapore: Springer.
Siahaan, R. F., Zarlis, M., & Nasution, B. B. (2018, September). Performance analysis of steganography alphanumeric text in the text based on Indonesian linguistic. In IOP Conference Series: Materials Science and Engineering (Vol. 420, No. 1, p. 012123). IOP Publishing.
Zuo, X., Hu, H., Zhang, W., & Yu, N. (2018, June). Text semantic steganalysis based on word embedding. In International Conference on Cloud Computing and Security (pp. 485–495). Cham: Springer.
Fateh, M., & Rezvani, M. (2018). An email-based high capacity text steganography using repeating characters. International Journal of Computers and Applications, 1–7. https://doi.org/10.1080/1206212x.2018.1517713
Xiang, L., Li, Y., Hao, W., Yang, P., & Shen, X. (2018). Reversible natural language watermarking using synonym substitution and arithmetic coding. Computers, Materials and Continua, 55(3), 541–559.
Ashraf, Z., Roy, M. L., Muhuri, P. K., & Lohani, Q. D. (2018, July). A novel image steganography approach based on interval type-2 fuzzy similarity. In 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (pp. 1–8). IEEE.
Bhushan, B., & Sahoo, G. (2017). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98(2), 2037–2077. https://doi.org/10.1007/s11277-017-4962-0.
Kumar, R., Chandra, P., & Hanmandlu, M. (2016). A robust fingerprint matching system using orientation features. Journal of Information Processing Systems, 12(1), 83–99.
Kumar, R., Chandra, P., & Hanmandlu, M. (2012). Fingerprint matching based on orientation feature. In Advanced Materials Research (Vol. 403, pp. 888–894). Trans Tech Publications.
Gupta, B. B., & Samir, K. B. (2013). A DWT method for image steganography. International Journal of Advanced Research in Computer Science and Software Engineering, 3, 983.
Shi, S., Qi, Y., & Huang, Y. (2016, December). An approach to text steganography based on search in internet. In Computer Symposium (ICS), 2016 International (pp. 227–232). IEEE.
Kumar, R., Chandra, P., & Hanmandlu, M. (2013, December). Local directional pattern (LDP) based fingerprint matching using SLFNN. In 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013) (pp. 493–498). IEEE.
Sinha, P., Rai, A. K., Jha, V. K., Bhushan, B. (2007, July) Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. In International Conference on Signal Processing and Communication - ICSPC'17, Coimbatore, Tamil Nadu, India.
Bennett, K. (2004). Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text.
Al-Hamami, A. H., & Al-Shamkhy, R. A. Using natural features of letters in text information hiding.
Huang, S., & Wu, J. K. (2007). Optical watermarking for printed document authentication. IEEE Transactions on Information Forensics and Security, 2(2), 164–173.
Liu, T. Y., & Tsai, W. H. (2007). A new steganographic method for data hiding in Microsoft word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security, 2(1), 24–30.
Shirali-Shahreza, M. (2008, February). Text steganography by changing words spelling. In 10th International Conference on Advanced Communication Technology, 2008. ICACT 2008. (Vol. 3, pp. 1912–1913). IEEE.
Gupta Banik, B., & Bandyopadhyay, S. K. (2018). Novel text steganography using natural language processing and part-of-speech tagging. IETE Journal of Research, 1–12. https://doi.org/10.1080/03772063.2018.1491807
Khairullah, M. (2018). A novel steganography method using transliteration of Bengali text. Journal of King Saud University - Computer and Information Sciences.
Samphaiboon, N., & Dailey, M. N. (2008, May). Steganography in Thai text. In 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, 2008. ECTI-CON 2008. (Vol. 1, pp. 133–136). IEEE.
Al-Azawi, A. F., & Fadhil, M. A. (2010). Arabic text steganography using kashida extensions with Huffman code. Journal of Applied Sciences, 10, 436–439.
Yang, B., et al. (2011). Steganography in MS Excel document using text-rotation technique. Information Technology Journal, 10(4), 889–893.
Shirali-Shahreza, M. H., & Shirali-Shahreza, M. (2006, July). A new approach to Persian/Arabic text steganography. In 5th IEEE/ACIS International Conference on Computer and Information Science, 2006 and 2006 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse. ICIS-COMSAR 2006 (pp. 310–315). IEEE.
Gutub, A., & Fattani, M. (2007). A novel Arabic text steganography method using letter points and extensions.
Chaudhary, S., Dave, M., Sanghi, A., & Sidh, H. (2018). Indian script encoding technique (ISET): A Hindi text steganography approach. In Information and Communication Technology for Sustainable Development (pp. 393–401). Singapore: Springer.
Yang, Z., Zhang, P., Jiang, M., Huang, Y., & Zhang, Y. J. (2018, June). RITS: Real-time interactive text steganography based on automatic dialogue model. In International Conference on Cloud Computing and Security (pp. 253–264). Cham: Springer.
Ahvanooey, M. T., Li, Q., Hou, J., Mazraeh, H. D., & Zhang, J. (2018). AITSteg: An innovative text steganography technique for hidden transmission of text message via social media. IEEE Access, 6, 65981.
Fateh, M., & Rezvani, M. (2018). An email-based high capacity text steganography using repeating characters. International Journal of Computers and Applications, 1–7. https://doi.org/10.1080/1206212x.2018.1517713
Bala, B., Kamboj, L., & Luthra, P. (2018). Secure file storage in cloud computing using hybrid cryptography algorithm. International Journal of Advanced Research in Computer Science, 9(2), 773.
Walke, A., Bhanushali, J., Rajgor, A., & Jain, J. (2018). Enhanced password processing scheme using visual cryptography and steganography. International Journal on Recent and Innovation Trends in Computing and Communication, 6(4), 35–37.
Baawi, S. S., Mokhtar, M. R., & Sulaiman, R. (2018, June). Enhancement of text steganography technique using Lempel-Ziv-Welch Algorithm and two-letter word technique. In International Conference of Reliable Information and Communication Technology (pp. 525–537). Cham: Springer.
Din, R., Utama, S., Hanizan, S. H., Hilal, M. M., Hanif, M. A., Zulhazlin, A., & Fazali, G. M. (2018). Evaluating the feature-based technique of text steganography based on capacity and time processing parameters. Advanced Science Letters, 24(10), 7355–7359.
Wu, Y., Chen, X., & Sun, X. (2018). Coverless steganography based on English texts using binary tags protocol. Journal of Internet Technology, 19(2), 599–606.
Azeem, M., Yongquan, C., Ditta, A., Rana, K. G., & Rajpoot, F. A. (2018). Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters. International Journal of Information and Computer Security, 10(4), 437–453.
Taha, A., Hammad, A. S., & Selim, M. M. (2018). A high capacity algorithm for information hiding in Arabic text. Journal of King Saud University-Computer and Information Sciences.
Hu, H., Zuo, X., Zhang, W., & Yu, N. (2018, June). Covert communication by exploring statistical and linguistical distortion in text. In International Conference on Cloud Computing and Security (pp. 288–301). Cham: Springer.
Kamat, S. D., Patil, S. S., & Mali, A. S. (2018). Implementation of steganographic model using inverted LSB insertion. International Journal of Engineering and Management Research (IJEMR), 8(4), 59–62.
Majumder, A., & Changder, S. (2013). A novel approach for text steganography: Generating text summary using reflection symmetry. Procedia Technology, 10, 112–120.
Kim, Y. W., Moon, K. A., & Oh, I. S. (2003, August). A text watermarking algorithm based on word classification and inter-word space statistics. In ICDAR (p. 775). IEEE.
Niimi, M., Minewaki, S., Noda, H., & Kawaguchi, E. (2003, August). A framework of text-based steganography using SD-form semantics model. In Pacific Rim Workshop on Digital Steganography (pp. 3–4).
Memon, J. A., Khowaja, K., & Kazi, H. (2008). Evaluation of steganography for Urdu/Arabic text. Journal of Theoretical and Applied Information Technology, 4(3), 232.
Zhong, S., Cheng, X., & Chen, T. (2007). Data hiding in a kind of PDF texts for secret communication. IJ Network Security, 4(1), 17–26.
Villán, R., Voloshynovskiy, S., Koval, O., Vila, J., Topak, E., Deguillaume, F., et al. (2006, February). Text data-hiding for digital and printed documents: Theoretical and practical considerations. In Security, Steganography, and Watermarking of Multimedia Contents VIII (Vol. 6072, p. 607212). International Society for Optics and Photonics.
Moerland, T. (2003, May 15). Steganography and steganalysis. Last visited May 1, 2009, from www.liacs.nl/home/tmoerlan/privtech.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kumar, R., Singh, H. (2020). Recent Trends in Text Steganography with Experimental Study. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-22277-2_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22276-5
Online ISBN: 978-3-030-22277-2
eBook Packages: Computer ScienceComputer Science (R0)