Abstract
Text steganography is inherently difficult due to minimal redundant information space to hide secret payload. The same fact limits the hiding capacity and security too. In this study, a novel technique has been proposed using a randomized indexed word dictionary, and a list of email addresses to increase the hiding capacity and security. A forward email platform has been used as the cover, and email addresses in the carbon copy (CC) field contain secret data that are encoded using a randomized index-based word dictionary. The email username list and indexed word dictionary are both pre-shared between the communicating parties. But during every new communication, a random bitstream (temporary stego-key) is generated from the system time and communicated separately using public-key cryptography. This temporary stego-key is used to randomize the index values of the words in the dictionary. Most of the existing state-of-the-art techniques provide a hiding capacity of 6–10%. The proposed scheme achieves a capacity of 12.17% using some common secret text and email body text (cover text) as used in all other studies. The proposed technique provides higher hiding capacity and security by randomizing the word indexes every time using temporary stego-key. It is also free from statistical attacks, OCR based attacks, and does not depend on the use of any particular text processor.
Similar content being viewed by others
References
Ahmad T, Marbun MSZ, Studiawan H et al (2014) A novel random email-based steganography. Int J e-Education, e-Business, e-Management e-Learning 4:129
Al-Nofaie S, Gutub A, Al-Ghamdi M (2019). Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. J King Saud Univ Inf Sci
Alsaidi A, Al-lehaibi K, Alzahrani H et al (2018) Compression multi-level crypto stego security of texts utilizing colored email forwarding. J Comput Sci Comput Math 8:33–42
Bennett K (2004). Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text. Tech Rep 2004–13
Biswas R, Bandyapadhay SK (2020) Random selection based GA optimization in 2D-DCT domain color image steganography. Multimed Tools Appl 79:7101–7120. https://doi.org/10.1007/s11042-019-08497-x
Changder S, Debnath NC (2009) A new approach for steganography in Bengali text. J Comput Methods Sci Eng 9:111–122
Chaudhary S, Dave M, Sanghi A, Sidh H (2018). Indian script encoding technique (ISET): a Hindi text steganography approach. In: Information and Communication Technology for Sustainable Development. Springer, pp 393–401
Desoky A (2009) Listega: list-based steganography methodology. Int J Inf Secur 8:247–261
El Rahman SA (2019) Text steganography approaches using similarity of English font styles. Int J Softw Innov 7:29–50
El-Khamy SE, Korany NO, El-Sherif MH (2017) A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption. Multimed Tools Appl 76:24091–24106. https://doi.org/10.1007/s11042-016-4113-8
Fateh M, Rezvani M (2018). An email-based high capacity text steganography using repeating characters. Int J Comput Appl 1–7
Garg M (2011) A novel text steganography technique based on html documents. Int J Adv Sci Technol 35:129–138
Gupta Banik B, Bandyopadhyay SK (2018) Novel text steganography using natural language processing and part-of-speech tagging. IETE J Res 66:1–12. https://doi.org/10.1080/03772063.2018.1491807
Hamzah AA, Khattab S, Bayomi H (2019). A linguistic steganography framework using Arabic calligraphy. J King Saud Univ Inf Sci
Kahn D (1996). The history of steganography. In: International Workshop on Information Hiding. pp 1–5
Kerckhoffs A (1883). La cryptographic militaire. J des Sci Mil 5–38
Khairullah MD (2009). A novel text steganography system using font color of the invisible characters in microsoft word documents. In: 2009 second international conference on computer and electrical engineering. Pp 482–484
Khan A, Sarfaraz A (2019) FFT-ETM based distortion less and high payload image steganography. Multimed Tools Appl 78:25999–26022. https://doi.org/10.1007/s11042-019-7664-7
Khosravi B, Khosravi B, Khosravi B, Nazarkardeh K (2019) A new method for pdf steganography in justified texts. J Inf Secur Appl 45:61–70
Kumar R, Chand S, Singh S (2014) An email based high capacity text steganography scheme using combinatorial compression. In: 2014 5th international conference - confluence the next generation information technology summit (confluence). IEEE, Noida, pp 336–339
Liu J, Li J, Zhang K, Bhatti UA, Ai Y (2019) Zero-watermarking algorithm for medical images based on dual-tree complex wavelet transform and discrete cosine transform. J Med Imaging Heal Informatics 9:188–194
Maher K (1995). TEXTO. ftp://ftp.funet.fi/pub/crypt/steganography/texto.tar.gz. Accessed 14 Aug 2019
Maji G, Mandal S (2019) Secure and robust image steganography using a reference image as key. Int J Innov Technol Explor Eng 8:2828–2839
Maji G, Mandal S, Debnath NC, Sen S (2019). Pixel value difference based image steganography with one time pad encryption. In: 17th international conference on industrial informatics (INDIN 2019). IEEE
Maji G, Mandal S, Sen S, Debnath NC (2018) Dual image based LSB steganography. In: 2nd international conference on recent advances in signal processing, telecommunications and computing, SIGTELCOM 2018. Ho Chi Minh City, Vietnam, pp 61–66
Murphy B, Vogel C (2007). The syntax of concealment: reliable methods for plain text information hiding. In: security, steganography, and watermarking of multimedia contents IX. P 65050Y
Murugan GVK, Uthandipalayam Subramaniyam R (2020) Performance analysis of image steganography using wavelet transform for safe and secured transaction. Multimed Tools Appl 79:9101–9115. https://doi.org/10.1007/s11042-019-7507-6
Nagarhalli TP (2014) A new approach to SMS text steganography using emoticons. Int J Comput Appl 975:8887
Narayana VL, Gopi AP, KUMAR NA (2018) Different techniques for hiding the text information using text steganography techniques: a survey. Ing des Syst d’Information 23:115
Por LY, Wong K, Chee KO (2012) UniSpaCh: a text-based data hiding method using Unicode space characters. J Syst Softw 85:1075–1082
Rabah K (2004) Steganography-the art of hiding data. Inf Technol J 3:245–269
Roy S, Manasmita M (2011). A novel approach to format based text steganography. In: proceedings of the 2011 international conference on communication, Computing & Security. Pp 511–516
Sadek MM, Khalifa AS, Mostafa MGM (2015) Video steganography: a comprehensive review. Multimed Tools Appl 74:7063–7094
Satir E, Isik H (2012) A compression-based text steganography method. J Syst Softw 85:2385–2394
Satir E, Isik H (2014) A Huffman compression based text steganography method. Multimed Tools Appl 70:2085–2110
Shirali-Shahreza M (2008). Text steganography by changing words spelling. In: 2008 10th international conference on advanced communication technology. Pp 1912–1913
Shirali-Shahreza MH, Shirali-Shahreza M (2008). A new synonym text steganography. In: 2008 international conference on intelligent information hiding and multimedia signal processing. Pp 1524–1526
Singh S, Siddiqui TJ (2018). Transform domain techniques for image steganography. In: computer vision: concepts, methodologies, tools, and applications. IGI global, pp 170–186
Tan D, Lu Y, Yan X, Wang X (2019). A simple review of audio steganography. In: 2019 IEEE 3rd information technology, Networking, Electronic and Automation Control Conference (ITNEC). pp 1409–1413
Trithemius J, Heidel WE (1721). Steganographia
Wang F, Huang L, Chen Z, et al (2013). A novel text steganography by context-based equivalent substitution. In: 2013 IEEE international conference on signal processing, communication and computing (ICSPCC 2013). Pp 1–6
Wang Z-H, Kieu TD, Chang C-C, Li M-C (2009). Emoticon-based text steganography in chat. In: 2009 Asia-Pacific conference on computational intelligence and industrial applications (PACIIA). Pp 457–460
Yuling L, Xingming S, Can G, Hong W (2007). An efficient linguistic steganography for Chinese text. In: 2007 IEEE international conference on multimedia and expo. Pp 2094–2097
Zhou X, Gong W, Fu W, Jin L (2016) An improved method for LSB based color image steganography combined with cryptography. In: 2016 IEEE/ACIS 15th international conference on computer and information science (ICIS). IEEE, Okayama, pp 1–4
Acknowledgments
This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Maji, G., Mandal, S. A forward email based high capacity text steganography technique using a randomized and indexed word dictionary. Multimed Tools Appl 79, 26549–26569 (2020). https://doi.org/10.1007/s11042-020-09329-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09329-z