Abstract
Steganography, or covert communication between two parties through public channels, has been received a lot of attention, since the mere existence of encrypted message might cause suspicion and could even provide useful information to eavesdroppers. In some cases, secret information needs to be covertly broadcast to receivers in multiple locations at the same time. In this paper, we propose a novel steganographic scheme, which covertly sends secret message to multiple receivers via a stream of running short text messages displayed on a media output screen, assuming appropriate optical character recognition (OCR) functionality at the decoder. We use Thai language short text messages as a case study. We analyze the characteristics of Thai short text messages and introduce some effective message-to-bit transformation methods. We find that one Thai short text message can be transformed into multiple secret bits. In principle, the proposed transformation methods can be applied to short text messages in any language. We use a provably secure construction that guarantees covertness, privacy, and authenticity of the secret data against active attacks. In an experimental evaluation, we show that four secret message bits can be embedded in each short text message. In addition, we find that the embedded bits can be retrieved correctly and easily by human observers without OCR functionality at the decoder. Thus, the scheme is practical and effective for covert communication from one sender to multiple receivers over public channels.
Similar content being viewed by others
References
Amano T, Misaki D (1999) A feature calibration method for watermarking of document images. In: Proceedings of the fifth international conference on document analysis and recognition ICDAR’99, pp 91–94
Brassil JT, Low S, Maxemchuk NF (1999) Copyright protection for the electronic distribution of text documents. Proc IEEE 87(7):1181–1196
Cvejic N, Seppänen T (2004) Increasing robustness of lsb audio steganography using a novel embedding method. In: ITCC ’04: proceedings of the international conference on information technology: coding and computing (ITCC’04), vol 2. IEEE Computer Society, Washington, DC, p 533
Dailey M, Namprempre C, Samphaiboon N (2009) How to do embedding steganography securely. http://www.cs.ait.ac.th/~mdailey/papers/DNS-ES-09.pdf
Huang D, Yan H (2001) Interword distance changes represented by sine waves for watermarking text images. IEEE Trans Circuits Syst Video Technol 11(12):1237–1245
Karoonboonyanan T (1999) Standardization and implementation of Thai language. National Electronics and Computer Technology Center, Bangkok
Kim Y-W, Oh I-S (2004) Watermarking text document images using edge direction histograms. Pattern Recogn Lett 25(11):1243–1251
Kim Y-W, Moon K-A, Oh I-S (2003) A text watermarking algorithm based on word classification and inter-word space statistics. In: Proceedings of the seventh international conference on document analysis and recognition, pp 775–779
Koanantakool T (1991) The keyboard layouts and input method of the Thai language. In: Information processing institute for education and development. Thammasat University, Bangkok
Lou D-C, Liu J-L (2002) Steganographic method for secure communications. Comput Secur 21(5):449–460
Muhammad H, Rahman S, Shakil A (2009) Synonym based malay linguistic text steganography. In: Innovative technologies in intelligent systems and industrial applications. CITISIA 2009, pp 423–427
Rogaway P, Bellare M, Black J (2003) Ocb: a block-cipher mode of operation for efficient authenticated encryption. ACM Trans Inf Syst Secur 6:365–403
Samphaiboon N, Dailey M (2008) Steganography in Thai text. In: Proceedings of ECTI-CON 2008, Krabi, Thailand
Shirali-Shahreza MH, Shirali-Shahreza M (2006) A new approach to Persian/Arabic text steganography. In: Proceedings of the 5th IEEE/ACIS international conference on computer and information science and 1st IEEE/ACIS international workshop on component-based software engineering, software architecture and reuse ICIS-COMSAR’06, pp 310–315
Shirali-Shahreza M, Shirali-Shahreza M (2007) Text steganography in sms. In: International conference on convergence information technology, pp 2260–2265
Su JK, Hartung F, Girod B (1998) Digital watermarking of text, image, and video documents. Comput Graph 22(6):687–695
Sun X, Luo G, Huang H (2004) Component-based digital watermarking of Chinese texts. In: Proceedings of the 3rd international conference on information security, Shanghai, China, pp 76–81
Topkara M, Taskiran CM, Delp EJ (2005) Natural language watermarking. In: Proceedings of SPIE-IS & T electronic imaging 2005, San Jose
Yuling L, Xingming S, Can G, Hong W (2007) An efficient linguistic steganography for chinese text. In: ICME, pp 2094–2097
Zhang W, Zeng Z, Pu G, Zhu, H (2006) Chinese text watermarking based on occlusive components. In: The 2nd information and communication technology ICTTA’06, vol 1, pp 1850–1854
Acknowledgements
We are grateful to Matthew Dailey, Chanathip Namprempre, Kiyoshi Honda, and Poompat Saengudomlert for helpful comments on this research. Sqd.Ldr. Natthawut Samphaiboon is with the Royal Thai Air Force and was supported in part by a graduate fellowship from the Royal Thai Government.
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported in part by a graduate fellowship from the Royal Thai Government.
Rights and permissions
About this article
Cite this article
Samphaiboon, N. Steganography via running short text messages. Multimed Tools Appl 52, 569–596 (2011). https://doi.org/10.1007/s11042-009-0432-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-009-0432-3