Skip to main content

Data Hiding on Social Media Communications Using Text Steganography

  • Conference paper
  • First Online:
Risks and Security of Internet and Systems (CRiSIS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10694))

Included in the following conference series:

Abstract

This research work proposes a steganography on social media communications. Nowadays, people frequently use messenger or social network such as Skype, Line, Facebook, Whatsapp and Twitter, etc. to communicate with other people and these platforms become popular to be used to exchange secrets or preserve personal information. Personal information like accounts and passwords might not be seen and embedded to cover objects when two clients communicate to each other. Those objects shall be pictures, music, or text messages. The proposed scheme will be deployed on the cover text. A strategy is designed to increase the capacity of hidden data and try to make any simple piece of text to be the cover text; such as letters, article of news or the common messages. The new approach – Extended Line will be adopted, and then together with White Space between to increase the capacity of a text. The simulation results disclose that the algorithm not only increases the capacity, but also increases the efficiency of decoding. Moreover, it still works on any kind of cover text.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Norwood (2000)

    Google Scholar 

  2. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding: a survey. Proc. IEEE (Spec. Issue) 87, 1062–1078 (1999)

    Article  Google Scholar 

  3. Li, B., He, J., Huang, J., Shi, Y.Q.: A survey on image steganography and steganalysis. J. Inf. Hiding Multimedia Signal Process. 2, 142–172 (2011)

    Google Scholar 

  4. Bender, W., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–336 (1996)

    Article  Google Scholar 

  5. Shiu, H.J., Tang, S.Y., Huang, C.H., Lee, R.C.T., Lei, C.L.: A reversible acoustic data hiding method based on analog modulation. Inf. Sci. 273, 233–246 (2014)

    Article  Google Scholar 

  6. Shiu, H.J., Lin, B.S., Cheng, C.W., Huang, C.H., Lei, C.L.: High-capacity data-hiding scheme on synthesized pitches using amplitude enhancement-a new vision of non-blind audio steganography. Symmetry 9(6), 92–111 (2017)

    Article  MathSciNet  Google Scholar 

  7. Shiu, H.J., Ng, K.L., Fang, J.F., Lee, R.C.T., Huang, C.H.: Data hiding methods based upon DNA sequences. Inf. Sci. 180, 2196–2208 (2010)

    Article  MathSciNet  Google Scholar 

  8. Rafat, K.F.: Enhanced text steganography in SMS. In: 2nd International Conference on Computer, Control and Communication (2009)

    Google Scholar 

  9. Shirali-Shahreza, M., Shirali-Shahreza, M.H.: A new approach to Persian/Arabic text steganography. In: 5th IEEE/ACIS International Conference on Computer and Information Science (2006)

    Google Scholar 

  10. Shirali-Shahreza, M., Shirali-Shahreza, M.H.: Text steganography in SMS. In: 2007 International Conference on Convergence Information Technology (2007)

    Google Scholar 

  11. Shirali-Shahreza, M., Shirali-Shahreza, M.H.: A new synonym text steganography. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2008)

    Google Scholar 

  12. Shirali-Shahreza, M., Shirali-Shahreza, M.H.: Text steganography in chat. In: 3rd IEEE/IFIP International Conference in Central Asia on Internet (2007)

    Google Scholar 

  13. Shirali-Shahreza, M.: Test steganography by changing words spelling. In: 10th International Conference on Advanced Communication Technology (2008)

    Google Scholar 

  14. Roy, S., Manasmita, M.: A novel approach to format based text steganography. In: 2011 International Conference on Communication, Computing and Security (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chien-Hung Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shiu, HJ., Lin, BS., Lin, BS., Huang, PY., Huang, CH., Lei, CL. (2018). Data Hiding on Social Media Communications Using Text Steganography. In: Cuppens, N., Cuppens, F., Lanet, JL., Legay, A., Garcia-Alfaro, J. (eds) Risks and Security of Internet and Systems. CRiSIS 2017. Lecture Notes in Computer Science(), vol 10694. Springer, Cham. https://doi.org/10.1007/978-3-319-76687-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-76687-4_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-76686-7

  • Online ISBN: 978-3-319-76687-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics