Abstract
Text steganography is regarded as the most challenging type to hide secret data to a text file because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party) issues of text steganography. Generally, the data hiding capacity of text steganography is limited, and imperceptibility is very poor. Therefore, a new scheme was suggested to improve the two-letter word technique by using the Lempel-Ziv-Welch algorithm. This scheme can hide 4 bits in each position of a two-letter word in the cover text by inserting a nonprinting Unicode symbol. Each two-letter word can have four different locations in the text. Some experiments were conducted on the proposed method (enhancement) and our previous method (two-letter word) to compare their performance applying twelve secret message samples in terms of capacity and Jaro-Winkler. On the other hand, the performance of our proposed method was compared with other related studies in terms of capacity. The results show that the proposed method not only had a high embedding capacity but also reduced the growing size ratio between the original cover and stego cover. In addition, the security of the proposed approach was improved through improving imperceptibility and by using stego-key.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Obeidat, A.A.: Arabic text steganography using unicode of non-joined to right side letters. J. Comput. Sci. 13, 184–191 (2017)
Bhattacharjee, A.K., Bej, T., Agarwal, S.: Comparison study of lossless data compression algorithms for text data. IOSR J. Comput. Eng. 11, 15–19 (2013)
Baawi, S.S., Mokhtar, M.R., Sulaiman, R.: New text steganography technique based on a set of two-letter words. J. Theor. Appl. Inf. Technol. 95, 6247–6255 (2017)
Vidhya, P.M., Paul, V.: A method for text steganography using malayalam text. Proc. Comput. Sci. 46, 524–531 (2015)
Satir, E., Isik, H.: A Huffman compression based text steganography method. Multimed. Tools Appl. 70, 2085–2110 (2014)
Khalil, I.: Highly imperceptible and reversible text steganography using invisible character based codeword. In: Twenty First Pacific Asia Conference on Information Systems, Langkawi, p. 230 (2017)
Por, L.Y., Wong, K., Chee, K.O.: UniSpaCh: a text-based data hiding method using unicode space characters. J. Syst. Softw. 85, 1075–1082 (2012)
Satir, E., Isik, H.: A compression based text steganography method. J. Syst. Softw. 85, 2385–2394 (2012)
Wang, F., Huang, L., Chen, Z., Yang, W., Miao, H.: A novel text steganography by context-based equivalent substitution. In: 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC), pp. 1–6 (2013)
Kumar, R., Chand, S., Singh, S.: An email based high capacity text steganography scheme using combinatorial compression. In: 25th Internal Conference Confluence The Next Generation Information Technology Summit (Confluence), 25–26 September, pp. 336–339. IEEE (2014)
Malik, A., Sikka, G., Verma, H.K.: A high capacity text steganography scheme based on LZW compression and color coding. Eng. Sci. Technol. Int. J. 20, 72–79 (2017)
Kapoor, S., Chopra, A.: A review of Lempel Ziv compression techniques. Int. J. Comput. Sci. Technol. 4, 246–248 (2013)
Kingslin, S., Kavitha, N.: Evaluative approach towards text steganographic techniques. Indian J. Sci. Technol. 8, 79–86 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Baawi, S.S., Mokhtar, M.R., Sulaiman, R. (2019). Enhancement of Text Steganography Technique Using Lempel-Ziv-Welch Algorithm and Two-Letter Word Technique. In: Saeed, F., Gazem, N., Mohammed, F., Busalim, A. (eds) Recent Trends in Data Science and Soft Computing. IRICT 2018. Advances in Intelligent Systems and Computing, vol 843. Springer, Cham. https://doi.org/10.1007/978-3-319-99007-1_49
Download citation
DOI: https://doi.org/10.1007/978-3-319-99007-1_49
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99006-4
Online ISBN: 978-3-319-99007-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)