Skip to main content

Dual Stage Text Steganography Using Unicode Homoglyphs

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 536))

Abstract

Text steganography is hiding text in text. A hidden text gets hidden in a cover text to produce a plain looking stego text. This plain looking stego text is posted as the message which no one suspects to contain anything concealed. Today, text messages are a common mode of communication over the internet and it is associated with a huge amount of traffic. Steganography is an added layer of protection that can be used for security and privacy. In this paper, we describe a text steganography approach that provides a good capacity and maintains a high difficulty of decryption. We make use of approaches of space manipulation, linguistic translation and Unicode homoglyphs in our algorithm. Our implementation is in Python. Also, we explain a parallel approach for hiding large hidden text messages in large cover text messages.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Nechta, I., Fionov, A.: Applying statistical methods to text steganography (2011). arXiv preprint arXiv:1110.2654

  2. Kahn, D.: The Codebreakers. Macmillan, New York (1967)

    Google Scholar 

  3. Norman, B.: Secret Warfare. Acropolis Books, Washington, D.C. (1973)

    Google Scholar 

  4. Zim, H.S.: Codes and Secret Writing. William Morrow, New York (1948)

    Google Scholar 

  5. J. Brassilet et al., Document Marking and Identification using Both Line and Word Shifting. In: Proceedings of Infocom 1995. IEEE CS Press, Los Alamitos (1995)

    Google Scholar 

  6. Shahreza, M.H.S., Shahreza, M.S.: A new synonym text steganography. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1524–1526 (2006)

    Google Scholar 

  7. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–336 (1996)

    Article  Google Scholar 

  8. Roshanbin, N., Miller, J.: Finding homoglyphs - a step towards detecting unicode-based visual spoofing attacks. In: Bouguettaya, A., Hauswirth, M., Liu, L. (eds.) WISE 2011. LNCS, vol. 6997, pp. 1–14. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  9. Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 156–165. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  10. Chapman, M., Davida, G.: Hiding the hidden ciphertext in innocuous text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to H. G. Rama Bhat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Hosmani, S., Bhat, H.G.R., Chandrasekaran, K. (2015). Dual Stage Text Steganography Using Unicode Homoglyphs. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics