Text Steganography Based on Text Justifying Methods

Document Type : Original Article

Authors

1 Department of Mathematics, Faculty of science - Qom university of technology, Qom, Iran

2 Department of Mathematics, institute for advanced studies in basic sciences, Zanjan, Iran

Abstract

One of the most important information security techniques is the hiding of information. Steganography is the art and science of hiding information in the cover of data (in the form of text, image, video, or audio) such that it does not arise any suspicions, and is difficult or even impossible to discover. This paper presents a method for steganography in the form of text which uses the methods of text justifying in typing editors. The method presented in this paper is able to hide information better than some of previous algorithms in this field. This algorithm is resistant to various forms of attack such as visual, structural and statistical attacks. Another important capability of this method is that it can be used to send printed information.

Keywords


  1. Krenn, J. R. “Steganography and Steganalysis”; http://www.Krenn.nl/univ/cry/steg/article.pdf.##
  2. Xiang, L.; Wu, W.; Li, X.; Yang, C. “A Linguistic Steganography Based on Word Indexing Compression and Candidate Selection”; Multimed. Tools Appl. 2018, 77, 28969–28989.##
  3. Liu, T. Y.; Tsai, W. H. “A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique”; IEEE Trans. Inf. Foren. Sec. 2007, 2, 24–30.##
  4. Yang, W. C.; Chen, L. H. “A Steganographic Method via Various Animations in PowerPoint Files”; Multimed. Tools Appl. 2015, 74, 1003–1019.##
  5. Khairullah, M. “A Novel Text Steganography System Using Font Color of the Invisible Characters in Microsoft Word Documents”; Int. C. Comp. Elec. Eng. 2009, 482-484.##
  6. Bolshakov I. A. “A Method of Linguistic Steganography Based on Collocational-Verified Synonymy”; Fridrich J. (eds) Information Hiding. IH 2004. Lecture Notes in Computer Science, vol 3200. Springer, Berlin, Heidelberg 2004##.
  7. Shahreza, M. H. S.; Shahreza, M. S. “A New Approach to Persian/Arabic Text Steganography”; Proc. 5th IEEE/ACIS Int. Conf. Comput. Inform. Sci. and 1st IEEE/ACIS Int. Workshop on Component-Based Software Engineering, Software Architecture and Reuse, 2006, 310-315.##
  8. Shahreza, M. H. S.; Shahreza, M. S. “A New Synonym Text Steganography”; Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing, 2006, 1524-1526.##
  9. Lee, I. ; Tsai, W. H. “A New Approach to Covert Communication via PDF Files”; Signal Process 2010, 90, 557–565.##
  10. Khosravi, B.; Nazarkardeh, Kh. “A New Method for Pdf Steganography in Justified Texts”; J. Inf. Secur. Appl. 2019, 45, 2, 61-70.##
  11. Douglas, M.; Bailey, K.; Leeney, M.; Curran, K. “An Overview of Steganography Techniques Applied to the Protection of Biometric Data”; Multimed. Tools Appl. 2018, 77, 13, 17333-17373.##
  12. Maji, G.; Mandal, Sh. “A Forward email Based High Capacity Text Steganography Technique Using a Randomized and Indexed Word Dictionary”; Multimed. Tools Appl. 2020, 79, 26549–26569.##
  13. Brassil, J. T.; Low, S.; Maxemchuk, N. F.; O'Gorman, L., "Electronic Marking and Identification Techniques to Discourage Document Copying”; IEEE J. Selected Areas Commun. 1995, 13, 1495-1504.##
  14. Mahato, S.; Khan, D. A.; Yadav, D. K. “A Modified Approach to Data Hiding in Microsoft Word Documents by Change-Tracking Technique”; J. Comput. Inf. Sci. 2020, 32, 216-224.##
  15. Winstein, K. “Lexical Steganography Through Adaptive Modulation of the Word Choice Hash”; Secondary education at the Illinois Mathematics and Science Academy, 1999, http://alumni.imsa.edu/~keithw/tlex/lsteg.ps. Accessed 20 March 2017.##
  16. Kumar R.; Singh, H. “Recent Trends in Text Steganography with Experimental Study”; Gupta B., Perez G., Agrawal D., Gupta D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham, 2020.##
  17. Shamalizadeh Baei, M. A.; Norozi, Z.; Sabzinezhad, M.; Karami M. R. “Designing an Image Steganography Algorithm Based on Entropy and ELSB2”; Adv. Defence Sci. & Technol. 2018, 02, 39-50 (In Persian).##