Text Steganography: Design and Implementation of a Secure and Secret Message Sharing System

  • K. Aditya KumarEmail author
  • Suresh Pabboju
Conference paper
Part of the Learning and Analytics in Intelligent Systems book series (LAIS, volume 3)


Textual communication among parties where sensitive information is exchanged is prone to potential risks. Therefore, it is indispensable to have mechanism to protect such communications from malicious attacks. In the contemporary world, national cyber security has become a concern which needs to be given paramount importance. Cyber criminals have acquired wherewithal to challenge the critical digital infrastructure of a country if there is no sustainable effort to safeguard information security and forensics. For secret messaging, two important techniques are cryptography and Steganography. The focus of this paper is on text Steganography which is light weight and faster than other forms where audio or image or video is used as cover media. Light weight means of text embedding and extraction mechanisms are defined and implemented for secure and secret sharing of information. A prototype application is built to demonstrate proof of the concept.


Text steganography Information security Cryptography Secret message sharing 


  1. 1.
    Shivani, Yadav VK, Batham S (2015). A novel approach of bulk data hiding using text steganography. Procedia Comput Sci 57: 1401–1410 Google Scholar
  2. 2.
    Tutuncu K, Hassan AA (2015) New approach in E-mail based text steganography. Int J Intell Syst Appl Engineering 3(2):54–56CrossRefGoogle Scholar
  3. 3.
    Osman B, Din R, Idrus MR (2013) Capacity performance of steganography method in text based domain. ARPN J Eng Appl Sci 10:1–8Google Scholar
  4. 4.
    Shi S, Qi Y, Huang Y (2016) An approach to text steganography based on search in internet. IEEE, pp 1–6Google Scholar
  5. 5.
    Shutko N (2016) The use of aprosh and kerning in text steganography, pp 1–4Google Scholar
  6. 6.
    Lwin T, Su Wai P (2014) Information hiding system using text and image steganography. Int J Sci Eng Technol Research 3(10):1972–1977Google Scholar
  7. 7.
    Khairullah Md (2014) A novel text steganography system in financial statements. Int J Database Theory Application 7(5):123–132CrossRefGoogle Scholar
  8. 8.
    Stojanov I, Mileva A, Stojanovic´ I (2014) A new property coding in text steganography of microsoft word documents, pp 1–6Google Scholar
  9. 9.
    Al-Nofaie SM, Fattani MM, Gutub AAA (2016) Capacity improved arabic text steganography technique utilizing ‘Kashida’ with whitespaces. In: The 3rd International Conference on Mathematical Sciences and Computer Engineering, pp 1–7Google Scholar
  10. 10.
    Ahmadoh EM (2015) Utilization of two diacritics for arabic text steganography to enhance performance. Lect Notes Inf Theory 3(1):1–6Google Scholar
  11. 11.
    Kumar R, Chand S, Singh S (2015) An efficient text steganography scheme using unicode space characters. Int J Forensic Comput Science 1:8–14CrossRefGoogle Scholar
  12. 12.
    Shah R, Chouhan YS (2014) Encoding of hindi text using steganography technique. Int J Sci Int J Sci Res Comp C Res Comput Sci Engineering 2(1):1–7Google Scholar
  13. 13.
    Mersal S, Alhazmi S, Alamoudi R, Almuzaini N (2014) Arabic text steganography in smartphone. Int J Comput Inf Technology 3(2):1–5Google Scholar
  14. 14.
    Iyer SS, Lakhtaria K (2016) New robust and secure alphabet pairing text steganography algorithm. Int J Curr Trends Eng Res 2(7):15–21Google Scholar
  15. 15.
    Kour J, Verma D (2014) Steganography techniques –a review paper. Int J Emerg Res Manag Technology 3(5):1–4Google Scholar
  16. 16.
    Aditya Kumar K, Pabboju S (2018) An optimized text steganography approach using differently spelt english words. Int J Pure Appl Math 118(16):653–666Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Osmania UniversityHyderabadIndia
  2. 2.IT DepartmentCBITHyderabadIndia

Personalised recommendations