Abstract
Steganography is an art in which the data can be hidden in other data as cover, the text files are commonly used for hiding data. The main aspects of steganography are the capacity and security, where the capacity refers to how much data can be hidden in the cover carrier, while the security concerns with the ability of disclosing or altering the data by unauthorized party. The aim of this project is to implement an algorithm to reduce the size of objects created using steganography. In addition, the security level of each approach is made more secured. This project presents an overview of text steganography and various existing text-based steganography techniques. Highlighted are some of the problems inherent in text steganography as well as issues with existing solutions. A new approach is proposed in information hiding using interword spacing which reduces the amount of information to hide. This method offers generated stego text of maximum capacity according to the length of the secret message.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Por, L.Y., Delina, B.: Information hiding: a new Approach in text steganography. Paper presented at the 7th WSEAS international conference on applied computer & applied computational science’08, Hangzhou, China, 6–8 April 2008
Chapman, M., Davida, G., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Proceedings of the Information Security Conference, October 2001, pp. 156–165. Malaga, Spain, October 1-3
Johnson, N.F.: Steganography. http://www.jjtc.com/stegdoc/index2.html. Accessed November 1995
Bennett, K.: Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text. Purdue University, CERIAS Technical Report, 2004
Wayner, P.: Disappearing Cryptography: Being and Nothingness on the Net. Academic Press Inc., New York (1996)
Brassil, J., Low, S., Maxemchuk, N.F., O’Garman, L.: Electronic marking and identification techniques to discourage document copying. IEEE J. Sel. Areas Comm. 13, 1495–1504 (1995)
Spammimic. http://www.spammimic.com (2000). Accessed 1 July 2009
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–336 (1996)
Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. Security & Privacy, IEEE 1(2), 32–44 (2003)
Mohammed Al-Mualla and Hussain Al-Ahmad.: Information hiding: steganography and watermarking. http://www.emirates.org/ieee/information_hiding.pdf (2009). Accessed 1 July 2009
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Akhilandeswari, P., George, J.G. (2014). Secure Text Steganography. In: Sathiakumar, S., Awasthi, L., Masillamani, M., Sridhar, S. (eds) Proceedings of International Conference on Internet Computing and Information Communications. Advances in Intelligent Systems and Computing, vol 216. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1299-7_1
Download citation
DOI: https://doi.org/10.1007/978-81-322-1299-7_1
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1298-0
Online ISBN: 978-81-322-1299-7
eBook Packages: EngineeringEngineering (R0)