Skip to main content

Enhancement of Text Steganography Technique Using Lempel-Ziv-Welch Algorithm and Two-Letter Word Technique

  • Conference paper
  • First Online:
Recent Trends in Data Science and Soft Computing (IRICT 2018)

Abstract

Text steganography is regarded as the most challenging type to hide secret data to a text file because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party) issues of text steganography. Generally, the data hiding capacity of text steganography is limited, and imperceptibility is very poor. Therefore, a new scheme was suggested to improve the two-letter word technique by using the Lempel-Ziv-Welch algorithm. This scheme can hide 4 bits in each position of a two-letter word in the cover text by inserting a nonprinting Unicode symbol. Each two-letter word can have four different locations in the text. Some experiments were conducted on the proposed method (enhancement) and our previous method (two-letter word) to compare their performance applying twelve secret message samples in terms of capacity and Jaro-Winkler. On the other hand, the performance of our proposed method was compared with other related studies in terms of capacity. The results show that the proposed method not only had a high embedding capacity but also reduced the growing size ratio between the original cover and stego cover. In addition, the security of the proposed approach was improved through improving imperceptibility and by using stego-key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Obeidat, A.A.: Arabic text steganography using unicode of non-joined to right side letters. J. Comput. Sci. 13, 184–191 (2017)

    Article  Google Scholar 

  2. Bhattacharjee, A.K., Bej, T., Agarwal, S.: Comparison study of lossless data compression algorithms for text data. IOSR J. Comput. Eng. 11, 15–19 (2013)

    Article  Google Scholar 

  3. Baawi, S.S., Mokhtar, M.R., Sulaiman, R.: New text steganography technique based on a set of two-letter words. J. Theor. Appl. Inf. Technol. 95, 6247–6255 (2017)

    Google Scholar 

  4. Vidhya, P.M., Paul, V.: A method for text steganography using malayalam text. Proc. Comput. Sci. 46, 524–531 (2015)

    Article  Google Scholar 

  5. Satir, E., Isik, H.: A Huffman compression based text steganography method. Multimed. Tools Appl. 70, 2085–2110 (2014)

    Article  Google Scholar 

  6. Khalil, I.: Highly imperceptible and reversible text steganography using invisible character based codeword. In: Twenty First Pacific Asia Conference on Information Systems, Langkawi, p. 230 (2017)

    Google Scholar 

  7. Por, L.Y., Wong, K., Chee, K.O.: UniSpaCh: a text-based data hiding method using unicode space characters. J. Syst. Softw. 85, 1075–1082 (2012)

    Article  Google Scholar 

  8. Satir, E., Isik, H.: A compression based text steganography method. J. Syst. Softw. 85, 2385–2394 (2012)

    Article  Google Scholar 

  9. Wang, F., Huang, L., Chen, Z., Yang, W., Miao, H.: A novel text steganography by context-based equivalent substitution. In: 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC), pp. 1–6 (2013)

    Google Scholar 

  10. Kumar, R., Chand, S., Singh, S.: An email based high capacity text steganography scheme using combinatorial compression. In: 25th Internal Conference Confluence The Next Generation Information Technology Summit (Confluence), 25–26 September, pp. 336–339. IEEE (2014)

    Google Scholar 

  11. Malik, A., Sikka, G., Verma, H.K.: A high capacity text steganography scheme based on LZW compression and color coding. Eng. Sci. Technol. Int. J. 20, 72–79 (2017)

    Article  Google Scholar 

  12. Kapoor, S., Chopra, A.: A review of Lempel Ziv compression techniques. Int. J. Comput. Sci. Technol. 4, 246–248 (2013)

    Google Scholar 

  13. Kingslin, S., Kavitha, N.: Evaluative approach towards text steganographic techniques. Indian J. Sci. Technol. 8, 79–86 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Salwa Shakir Baawi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Baawi, S.S., Mokhtar, M.R., Sulaiman, R. (2019). Enhancement of Text Steganography Technique Using Lempel-Ziv-Welch Algorithm and Two-Letter Word Technique. In: Saeed, F., Gazem, N., Mohammed, F., Busalim, A. (eds) Recent Trends in Data Science and Soft Computing. IRICT 2018. Advances in Intelligent Systems and Computing, vol 843. Springer, Cham. https://doi.org/10.1007/978-3-319-99007-1_49

Download citation

Publish with us

Policies and ethics