JMCER

Proposed Method for Text Steganography

  • Received
    November 30, 2023
  • Revised
    February 8, 2024
  • Accepted
    February 10, 2024
  • Published
    February 10, 2024

Authors

  • Alaa Abdullah Idress
  • Yaseen Hikmat Ismael

Abstract:

Many people can now communicate with each other easily and at a high speed. However, using the Internet for communication is accompanied by the problem of providing protection. Researchers initially used various encryption systems to provide data protection, but seeing the data in its encrypted form raises suspicion in the attacker or intruder that significant and sensitive data has been encrypted, which uses different methods to break the code and try to find out its content. Information-hiding techniques have emerged as a tool embedded in secret data within a transmission medium so the attacker will not notice the presence of that data. Steganography technology uses different media types to cover includes the secret message. The media can be an images, audio, video, text, or other media. The process of hiding in text involves a set of challenges or difficulties, the most important of which is the lack of spaces that can be exploited in the process of hiding, in addition to the significant influence of the text on the hidden data. This research proposes a method for hiding inside the text. The technique consists of two levels. The first is searching for the letters of the secret message in the cover text and encoding those locations. In contrast, the second level includes converting the symbols of the letter locations into a binary form and hiding them in the cover text in a new way. The proposed method achieved a high level of security for hiding data within the text, making it difficult for an attacker to discover it.

Keywords

Text-Steganography, Information Hiding, Text Confidentiality

References:

Adeeb, O.F.A. and Kabudian, S.J., 2022. Arabic text steganography based on deep learning methods. IEEE Access, 10, pp.94403-94416.

Agarwal, M., 2013. Text steganographic approaches: a comparison. arXiv preprint arXiv:1302.2718.

Akbar, F.C., Purboyo, T.W. and Latuconsina, R., 2020. A study of text steganography methods. Journal of Engineering and Applied Sciences, 15(2), pp.369-372.

Alanazi, N., Khan, E. and Gutub, A., 2022. Inclusion of unicode standard seamless characters to expand Arabic text steganography for secure individual uses. Journal of King Saud University-Computer and Information Sciences, 34(4), pp.1343-1356.

Al-Nofaie, S., Gutub, A. and Al-Ghamdi, M., 2021. Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. Journal of King Saud University-Computer and Information Sciences, 33(8), pp.963-974.

Alyousuf, F.Q.A. and Din, R., 2020. Analysis review on feature-based and word-rule-based techniques in text steganography. Bulletin of Electrical Engineering and Informatics, 9(2), pp.764-770.

Chaw, A.A., 2019. Text steganography in Letter of Credit (LC) using synonym substitution based algorithm. International Journal for Advance Research and Development, 4(8), pp.59-63.

Figueira, J., 2022. A Survey on Semantic Steganography Systems. arXiv preprint arXiv:2203.12425.

Hamdan, A.M. and Hamarsheh, A., 2016. AH4S: an algorithm of text in text steganography using the structure of omega network. Security and Communication Networks, 9(18), pp.6004-6016.

Idres, A.A. and Yaseen, H.I., 2023. Text Steganography Techniques: A Review. International Research Journal of Innovations in Engineering and Technology, 7(11), p.648.

Khan, Y., Algarni, A., Fayomi, A. and Almarashi, A.M., 2021. Disbursal of text steganography in the space of double-secure algorithm. Mathematical Problems in Engineering, 2021, pp.1-9.

Khosravi, B., 2023. Text steganography by changing the black color. AUT Journal of Mathematics and Computing.

Majeed, M.A., Sulaiman, R. and Shukur, Z., 2022. New Text Steganography Technique based on Multilayer Encoding with Format-Preserving Encryption and Huffman Coding. International Journal of Advanced Computer Science and Applications, 13(12).

Majeed, M.A., Sulaiman, R., Shukur, Z. and Hasan, M.K., 2021. A review on text steganography techniques. Mathematics, 9(21), p.2829.

Mandal, K.K. and Singh, P.K., 2019, March. Information Hiding in Text Steganography: A Different Approach. In Proceedings of 2nd International Conference on Advanced Computing and Software Engineering (ICACSE).

Mustafa, N.A.A., 2020. Text hiding in text using invisible character. International Journal of Electrical and Computer Engineering, 10(4), p.3550.

Osman, B., Yahya, N.I., Mohd Zaini, K. and Abdullah, A., 2023. Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes. Journal of Computational Innovation and Analytics (JCIA), 2(1), pp.21-40.

Sadié, J.K., Metcheka, L.M. and Ndoundam, R., 2020. Two high capacity text steganography schemes based on color coding. arXiv preprint arXiv:2004.00948.

Saibabu, P.C., Sai, H., Yadav, S. and Srinivasan, C.R., 2019. Synthesis of model predictive controller for an identified model of MIMO process. Indonesian Journal of Electrical Engineering and Computer Science, 17(2), pp.941-949.

Shakir, N.S. and Mahdi, M.S., 2023. Using special letters and diacritics in Steganography in holy Quran. Iraqi Journal for Computers and Informatics, 49(2), pp.1-8.

Sun, B., Li, Y., Zhang, J., Xu, H., Ma, X. and Xia, P., 2023. Topic Controlled Steganography via Graph-to-Text Generation. CMES-Computer Modeling in Engineering & Sciences, 136(1).

Taleby Ahvanooey, M., Li, Q., Hou, J., Rajput, A.R. and Chen, Y., 2019. Modern text hiding, text steganalysis, and applications: a comparative analysis. Entropy, 21(4), p.355.

Thabit, R., Udzir, N.I., Yasin, S.M., Asmawi, A. and Gutub, A.A.A., 2022. CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data. IEEE Access, 10, pp.65439-65458.

[fbcomments]