Conference PaperPDF Available

A novel font color and compression text steganography technique

Authors:

Figures

Content may be subject to copyright.
A novel Text Steganography using font color after data compression
Muhammad Askari, Ahsan Mahmood ´´
Air University, Islamabad
Abstract—In modern area data gains, lots of importance day
by day and data become a valuable asset for any organization.
The protection of data from any unauthorize access gains much
importance in this regard. Plenty of techniques adopted to
secure data for various situations like encryption, Blockchain
and Steganography techniques. This research article will focus on
data hiding method like Steganography where meta data is hided
inside non-secret source like 2D-3D images, audio, or Text. Fore-
gone in view, this study has several objectives: (1) To review the
Steganography mechanism (2) To review imperceptibility issue in
Text steganography (3) To review already proposed methods and
increase efficiency. Various articles indicate some common issues
of steganography where, if someone access to Steno images where
information is hidden and have the Steganography knowledge,
they may easily read the hidden information and the second
issue faced by the Steganography technique, if data is lost or
alter by someone during data in transit then the receiver can
not extract the hidden information. Foregone mentioned facts we
may add some extra security features by combining encryption
and steganography techniques to hide data from unauthorized
individuals, who knows about steganography techniques.
Index Terms—Steganography, encryption, Meta data, Stegno
text, transit.
I. INTRODUCTION
Data hiding play’s important role in data security to ex-
change hidden information from one place to another. The
text steganography has the advantage then others is its ubiquity
and small size. Other mediums have their own advantages but
due ubiquity and small size makes text steganography more
important.Similarly text steganography has some limitation in
term of capacity and imperceptibility. Research have been
done so far in text steganography to increase the hiding
capacity and imperceptibility. Khan et al have presented Polish
Text Steganography Method where the hiding process is base
on the dots present in the alphabets of polish language. If the
word contains dots on the letters it is counted as 1 and if
no dots found then consider 0. As the polish language have
frequent dots used in the words. It is much easy job to hide
the character on it[1]. Similarly shah et al presented a novel
technique called frequency normalization used with character
and string mapping to hide the data. The data hiding capacity
increased when it comes to hide data into spaces between two
characters [2]. Naharuddin et al have proposed study technique
where Secret message(ST) is embedded in Cover text(CT) so
no change in CT can be detected. The ST binary digit is
mapping with the binary digit of CT using ASCII characters
including space, punctuation and symbols. Before embedding
process, ST was encrypted using One time Pad (OTP) into
ciphertext. After ciphertext the each character then converted
to binary number of 7bits. The CT is also converted into 7 bits
of binary number. The process of mapping where one bit of
ST is map with first bit of CT character containing the same
number of bit. The process will continue still ST is completely
map to CT. The process has no effect on the CT appearance
[3].
II. THE PRO POS ED ME THO D AND SO LUT ION O F THE
PROBLEM
Text steganography has many limitations in terms of ca-
pacity, and imperceptibility but in the same situation, text
steganography has advantages like ubiquity and small size.
which makes this technique more unique and secure than other
techniques of steganography like images, videos, and audio.
Our novel proposed solution of text steganography using font
color after compression solves the issues related to capacity
and imperceptibility. The proposed solution is mainly divided
into three steps: 1. Secret information compression using
short keywords 2. Embedding process (compressed secret
information into font color) 3. Extraction process (Extract
secret information from stegno text)
1. Secret information compression using short keywords In
the first step of this method, a table of abbreviated words is
created to select a short form of information before sending
it to the receiver. Some sentences and short keywords are as
follows:
Fig. 1. Secret information compression using short keywords
This technique not only solved the capacity issues by
compressing the long secret text and words into some letters
but also solves imperceptibility issues. This process can easily
understand by understanding this example suppose a piece of
secret information uses this sentence ”You need to be positive
about a situation” this can be written as think positive and
with more compression, if added then it can be written as T+
the long sentence now become two letter word. Similarly, a
table containing such sentences and short abbreviated words
and letters makes this process more efficient. The short letter
words are now converted into an equivalent binary number
like binary numbers for C is 0100 0011 and for U is 0101
0101 vice versa.
2. Embedding process
After completion of the compression process, the secret in-
formation hiding process will start in this step the converted
short words and their equivalent binary codes are hidden in
the set RGB color scheme. This process is effective because
the reader normally focuses on the text, not on the font color.
In the RGB color scheme, the Red, Green, and Blue colors
have different binary codes generated when it is set to the
font or words. The representation of the RGB color scheme
is red = 10010001, green = 00110010, and blue = 01111011.
All color combinations can be made like light gray, shadow
gray, dark gray, and similar other colors can be formed by a
change in the binary digit of the RGB colors patterns. A slight
change in the last two binary digits makes a little effect on
the color scheme. Suppose we want to hide the letter U where
U=00100110 here four bits pair like 00 10 01 10 can be added
to the last two bits on the RGB color scheme.
Fig. 2. Embedding process
3. Extraction process
The extraction process is the reverse process of the embedded
process where stegno file is first convert into binary form and
then extract the binary code of last two digit on each font color
where color combination of RGB available. when each binary
code of font color extracted then the binary code converted
into english language. During this process the covered file
from the secret message. The extracted key words now match
with the table where complete sentences of each words are
present. When the letter and words are extracted from the
color scheme they will matched to the table where short and
compressed keyword equivalent sentence are presented.
Fig. 3. Extraction process
III. ALGORITHM FOR MAKING STEGNO FILE
The logic behind hiding the secret data into the cover file
is to select a word file have colored font text. where font is
selected to hide the secret data. The following algorithm will
use to create a program.
Fig. 4. Algorithm
IV. PSE UDO C ODE
The Pseudo code is basically a simplified version of an al-
gorithm where program flow or program code written close to
english language for better understanding to the programmer.
This code helps programmers to design the basic structure of
the program.
To hide the secret data into the cover text first we have to
upload the cover file. when the cover file uploaded the secret
message needed to insert. The program will extract the font
color binary code of RGB and start putting the binary digits of
the secret message into the font color. When secret message
are successfully hided into the cover text it will generate the
stegno file. The program will also perform reverse process at
receiver side. Where secret message will extract from stegno
file and generate the complete secret message.
Fig. 5. Pseudo code
V. EVALUATI ON OF T HE PRO POS ED SO LUT ION
Text steganography have two main issues less data hiding
capacity and data imperceptibility. Lots of Research done so
far and many techniques being discussed but both parameters
have not been addressed and resolved. In our novel text
steganography technique both high data hiding capacity and
data imperceptibility introduced. The data hiding capacity is
higher than other methods.
VI. CONCLUSION AND FUT URE WORK
In modern area data gains, lots of importance day by day
and data become a valuable asset for any organization. The
protection of data from any unauthorize access gains much
importance in this regard. Plenty of techniques adopted to
secure data for various situations like encryption, Blockchain
and Steganography techniques. This research article has ad-
dressed and solved issues related to Text Steganography. Text
steganography has many limitations in terms of capacity, and
imperceptibility but in the same situation, text steganography
has advantages like ubiquity and small size. which makes
this technique more unique and secure than other techniques
of steganography like images, videos, and audio. Our novel
proposed solution of text steganography using font color after
compression solves the issues related to capacity and imper-
ceptibility. In proposed method, English words, sentences and
their compressed version of code being discussed and solved.
In future numeric data hiding techniques and more work on
imperceptibility will be done.
REFERENCES
1 Khan, S., Abhijitha, B., Sankineni, R., and Sunil, B., “Polish text
steganography method using letter points and extension, in 2015 IEEE
International Conference on Electrical, Computer and Communication
Technologies (ICECCT). IEEE, 2015, pp. 1–5.
2 Shah, S. T. A., Khan, A., and Hussain, A., “Text steganography using
character spacing after normalization,” Int. J. Sci. Eng. Res, vol. 11, pp.
949–957, 2020.
3 Naharuddin, A., Wibawa, A. D., and Sumpeno, S., A high capacity and
imperceptible text steganography using binary digit mapping on ascii
characters,” in 2018 International Seminar on Intelligent Technology and
Its Applications (ISITIA). IEEE, 2018, pp. 287–292.
4 Shirali-Shahreza, M., “Text steganography by changing words spelling,”
in 2008 10th international conference on advanced communication tech-
nology, vol. 3. IEEE, 2008, pp. 1912–1913.
5 Singh, P., Chaudhary, R., and Agarwal, A., “A novel approach of text
steganography based on null spaces,” IOSR Journal of Computer Engi-
neering, vol. 3, no. 4, pp. 11–17, 2012.
6 Khairullah, M., “A novel text steganography system using font color of
the invisible characters in microsoft word documents, in 2009 second
international conference on computer and electrical engineering, vol. 1.
IEEE, 2009, pp. 482–484.
7 Rahman, M. S., Khalil, I., Yi, X., and Dong, H., “Highly imperceptible and
reversible text steganography using invisible character based codeword.
in PACIS, 2017, p. 230.
8 Shirali-Shahreza, M. and Shirali-Shahreza, M. H., “Text steganography
in sms,” in 2007 International Conference on Convergence Information
Technology (ICCIT 2007). IEEE, 2007, pp. 2260–2265.
9 Ahvanooey, M. T., Li, Q., Hou, J., Mazraeh, H. D., and Zhang, J., Aitsteg:
An innovative text steganography technique for hidden transmission of
text message via social media,” IEEE Access, vol. 6, pp. 65 981–65 995,
2018.
10 Minhao, L., Yunbiao, G., and Linna, Z., “Text steganography based on
online chat,” in Fifth International Conference on Intelligent Information
Hiding and Multimedia Signal Processing, 2009.
11 Liu, M., Guo, Y., and Zhou, L., “Text steganography based on online
chat,” in 2009 Fifth International Conference on Intelligent Information
Hiding and Multimedia Signal Processing. IEEE, 2009, pp. 807–810.
12 Joshi, K., “A new approach of text steganography using ascii values,
International Journal of Engineering Research & Technology (IJERT),
vol. 7, no. 5, 2018.
13 Fateh, M. and Rezvani, M., An email-based high capacity text steganog-
raphy using repeating characters,” International Journal of Computers and
Applications, vol. 43, no. 3, pp. 226–232, 2021.
14 Gupta Banik, B. and Bandyopadhyay, S. K., “Novel text steganography
using natural language processing and part-of-speech tagging,” IETE
Journal of Research, vol. 66, no. 3, pp. 384–395, 2020.
15 Mahato, S., Yadav, D. K., and Khan, D. A., A novel information hiding
scheme based on social networking site viewers’ public comments,
Journal of Information Security and Applications, vol. 47, pp. 275–283,
2019.
[4], [5], [6], [7], [3], [8], [9], [10], [11], [12], [2], [1], [13],
[14], [15]
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Text steganography is inherently difficult due to minimal redundant information space to hide secret payload. The same fact limits the hiding capacity and security too. In this study, a novel technique has been proposed using a randomized indexed word dictionary, and a list of email addresses to increase the hiding capacity and security. A forward email platform has been used as the cover, and email addresses in the carbon copy (CC) field contain secret data that are encoded using a randomized index-based word dictionary. The email username list and indexed word dictionary are both pre-shared between the communicating parties. But during every new communication, a random bitstream (temporary stego-key) is generated from the system time and communicated separately using public-key cryptography. This temporary stego-key is used to randomize the index values of the words in the dictionary. Most of the existing state-of-the-art techniques provide a hiding capacity of 6–10%. The proposed scheme achieves a capacity of 12.17% using some common secret text and email body text (cover text) as used in all other studies. The proposed technique provides higher hiding capacity and security by randomizing the word indexes every time using temporary stego-key. It is also free from statistical attacks, OCR based attacks, and does not depend on the use of any particular text processor.
Article
Full-text available
Steganography is technique of hiding a secret message in a cover medium. Text steganography uses a text file as a cover medium. There are many ways for hiding the secret message in the cover text without making any noticeable change in the cove r. In character level embedding techniques the secret message is hidden in certain characters that are selected based on certain properties. These methods have low data hiding capacity because the occurrence of selected characters in the cover document is not uniform. In this research, we have addressed this problem by using the frequency modulation techniques and improved the data hiding capacity of the cover document. The font attributes, character spacing has been used to embed the secret data. With our proposed technique, one character can be hidden in three alphabets on the average and there are eight possible ways to hide each secret character. The capacity is very close to uniform and the secret message remained inconspicuous to an adversary.
Conference Paper
Full-text available
Due to its light and multiplatform feature, plain text is widely used to transmit the information in news and social media online. However, it is vulnerable to attacks (e.g. unauthorized access or misuse of the information where the text is modified for particular purposes). To deal with the problem, secret text (ST) is embedded in overall plain texts appearing as a cover text (CT) so that any changes on CT can be detected. The present study proposes ST embedding method in CT by mapping ST binary digit onto binary digit of CT using ASCII characters-involving spaces, punctuation, and symbols. Prior to embedding process, the ST text was firstly encrypted with a One Time Pad (OTP) into ciphertext and each character was converted into binary number representing 7-bits long. Unlike the ST text, the CT text was immediately converted into 7 bits of binary number. The embedding process was conducted by mapping one bit of ST onto the first bit of CT character containing the same number of bit (e.g. mapping bit 1 of ST character onto the first bit 1 of CT character). Such a process was repeatedly carried out to ensure all bit of ST was completely embedded in CT. The system recorded each bit position as a stego key for any bit of ST had its position on bit of CT. The stego key served as a key to extract ST embedded in CT. The result of embedding process did not change the appearance of CT and therefore the method worked well with hidden information serving as text steganography or as watermark. In short, all CT characters can be used as a medium to hide ST where 1 character of ST required 7 characters of CT. In addition, the stego texts produced appeared identical to CT, as measured in similarity distance with Jaro-Winkler Distance of 1.
Article
Full-text available
With the popularity of smartphones and widespread use of high-speed Internet, social media has become a vital part of people’s daily life. Currently, text messages are used in many applications, such as mobile chatting, mobile banking, and mobile commerce. However, when we send a text message via short message service (SMS) or social media, the information contained in the text message transmits as a plain text, which exposes it to attacks. In some cases, this information may be confidential, such as banking credentials, secret missions, and confidential appointments; moreover, it is a major drawback to send such information via SMS or social media, as neither provides security before transmission. In this study, we propose a novel text steganography technique called AITSteg, which provides end-to-end security during the transmission of text messages via SMS or social media between end users. The AITSteg technique is evaluated by considering a trusted scenario. We then evaluate the efficiency of the proposed technique in terms of embedding capacity, invisibility, robustness, and security. The experiments confirm that the AITSteg is able to prevent various attacks, including man-in-the-middle attacks, message disclosure, and manipulation by readers. Moreover, we compare the experimental results with the existing techniques to show the superiority of the proposed technique. To the best of our knowledge, this is the first text steganography technique that provides end-to-end secure transmission of the text message using symmetric keys via social media.
Article
Full-text available
Steganography is the art of concealing text inside other carriers (i.e. text, image, video or audio) in order to provide data security and confidentiality without any suspicion. In this paper, an implementation of new text steganography method is proposed. The approach based on combining character's ASCII value with the RGB values of a pixel, so that an individual character can be stored into a single pixel. The main purpose of this method is to provide maximum payload capacity, an image can ever have that is the total number of pixels it contains.
Article
Full-text available
Compared to cryptography, steganography is a less discussed domain. However, there is a recent trend of exploiting various information hiding techniques to empower malware, for instance to bypass security frameworks of mobile devices or to exfiltrate sensitive data. This is mostly due to the need to counteract increasingly sophisticated security mechanisms, such as code analysis, runtime countermeasures, or real-time traffic inspection tools. In this perspective, this paper presents malware exploiting information hiding in a broad sense, i.e., it does not focus on classical covert channels, but also discusses other camouflage techniques. Differently from other works, this paper solely focuses on real-world threats observed in the 2011 - 2017 timeframe. The observation indicates a growing number of malware equipped with some form of data hiding capabilities and a lack of effective and universal countermeasures.
Article
Full-text available
Steganography is a secret writing wherein one person communicates with another without drawing suspicion to the secret communication through the medium. Text steganography is regarded the most difficult carrier to conceal secret data with because of its insufficient redundant information compared to image, audio, or video files. In this paper, we propose a new method for concealing information in English writing using non-printing characters, such as zero width non-joiner (ZWNJ) and zero width joiner (ZWJ). This approach uses to text steganography on text files. Secret information is embedded inside the English script using two-letter words based on their locations, hence achieving steganography. Results show that the technique satisfies perceptual transparency and information hiding capacity in the cover file by comparing with two previous developed existing methods. However, the size of the cover and stego document increases by approximately (22.61%) from the original size.
Article
In earlier reported chat-based steganography techniques, only direct communication between the sender and receiver was considered which can raise suspicion for further investigations by an attacker. If the adversary traces the communication between the two, he may investigate to find out the data shared during communication, can alter the content, or destroy it. In such a situation, a steganography system is required which can bypass adverse attention through indirect communication instead of direct communication. In this paper, we propose a new framework to camouflage hidden communication between the transceivers. The framework is based on online social networking and video-sharing website's communication. The secret message is communicated using comment features of these social networking and video-sharing websites in a totally new way compared with earlier approaches. Stego-comment is generated by performing synonym-substitution based on Huffman code on the auto-summarized previous comments of a chosen post. The stego-comment does not raise any suspicion to the intermediary by being technically similar to other comments which may not have any hidden message, which makes this method successful. Similarity indices of the stego-comment with respect to other comments are calculated using a String Similarity Tool which uses fuzzy comparison functions between strings for one sample dataset. The proposed method gives average bit-rate (as a measure of embedding efficiency) of 9.04 bits per sentence for a set of five different case studies which is high compared with average bit rates found in the literature. This communication cannot be traced between the communicators through traffic analysis in any easy way due to the absence of any direct communication.
Article
Email steganography is one of the subcategories of text steganography. This subcategory is noted due to the widespread use of emails for communication. In this paper, we propose a new method for email steganography which provides a high level of capacity along with a strong security level. Furthermore, since no surplus information is added to the cover text, we can use any kinds of email bodies as the cover text. In order to provide a high level of security, we offer several stego keys. In the first step of the proposed scheme, the secret message is compressed by using one of the lossless compression algorithms named LZW to several bit streams. Then in every step, due to number of email body’s characters, a part of each bit stream is selected and by using the email addresses will be created. The proposed method presents a capacity level of 10.6 over a common sample used by other studies, which proved a significant increase in term of capacity.
Article
The practice of transmitting secret data by using cover data is called steganography. At present, several versatile steganographic methods are available using different digital objects (e.g. image, audio, video, text, etc.) as cover to hide data. Accordingly, many methods of steganalysis have been explored to reveal statistical anomalies in stego object, through which presence of secret data can be detected. However, applications of steganography and steganalysis techniques are challenging when cover object is text, as text does not have any redundant bits. In this paper, an innovative text steganography approach is proposed which uses natural language text as cover as well as secret message. The concept of shared key is also used here, that holds the count of each parts-of-speech of secret message. This key is RSA encrypted and shared with communicative parties. Stego created by this method also is in natural language text. This method is successful as the stego keeps the original meaning of the text in gross which makes it robust and undetectable. It shows good result in capacity ratio; also, the similarity index has been assessed by Jaro–Winkler distance and Generalized Levenshtein distance.