Skip to main content
Log in

A forward email based high capacity text steganography technique using a randomized and indexed word dictionary

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Text steganography is inherently difficult due to minimal redundant information space to hide secret payload. The same fact limits the hiding capacity and security too. In this study, a novel technique has been proposed using a randomized indexed word dictionary, and a list of email addresses to increase the hiding capacity and security. A forward email platform has been used as the cover, and email addresses in the carbon copy (CC) field contain secret data that are encoded using a randomized index-based word dictionary. The email username list and indexed word dictionary are both pre-shared between the communicating parties. But during every new communication, a random bitstream (temporary stego-key) is generated from the system time and communicated separately using public-key cryptography. This temporary stego-key is used to randomize the index values of the words in the dictionary. Most of the existing state-of-the-art techniques provide a hiding capacity of 6–10%. The proposed scheme achieves a capacity of 12.17% using some common secret text and email body text (cover text) as used in all other studies. The proposed technique provides higher hiding capacity and security by randomizing the word indexes every time using temporary stego-key. It is also free from statistical attacks, OCR based attacks, and does not depend on the use of any particular text processor.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Ahmad T, Marbun MSZ, Studiawan H et al (2014) A novel random email-based steganography. Int J e-Education, e-Business, e-Management e-Learning 4:129

    Google Scholar 

  2. Al-Nofaie S, Gutub A, Al-Ghamdi M (2019). Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. J King Saud Univ Inf Sci

  3. Alsaidi A, Al-lehaibi K, Alzahrani H et al (2018) Compression multi-level crypto stego security of texts utilizing colored email forwarding. J Comput Sci Comput Math 8:33–42

    Article  Google Scholar 

  4. Bennett K (2004). Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text. Tech Rep 2004–13

  5. Biswas R, Bandyapadhay SK (2020) Random selection based GA optimization in 2D-DCT domain color image steganography. Multimed Tools Appl 79:7101–7120. https://doi.org/10.1007/s11042-019-08497-x

    Article  Google Scholar 

  6. Changder S, Debnath NC (2009) A new approach for steganography in Bengali text. J Comput Methods Sci Eng 9:111–122

    MATH  Google Scholar 

  7. Chaudhary S, Dave M, Sanghi A, Sidh H (2018). Indian script encoding technique (ISET): a Hindi text steganography approach. In: Information and Communication Technology for Sustainable Development. Springer, pp 393–401

  8. Desoky A (2009) Listega: list-based steganography methodology. Int J Inf Secur 8:247–261

    Article  Google Scholar 

  9. El Rahman SA (2019) Text steganography approaches using similarity of English font styles. Int J Softw Innov 7:29–50

    Article  Google Scholar 

  10. El-Khamy SE, Korany NO, El-Sherif MH (2017) A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption. Multimed Tools Appl 76:24091–24106. https://doi.org/10.1007/s11042-016-4113-8

    Article  Google Scholar 

  11. Fateh M, Rezvani M (2018). An email-based high capacity text steganography using repeating characters. Int J Comput Appl 1–7

  12. Garg M (2011) A novel text steganography technique based on html documents. Int J Adv Sci Technol 35:129–138

    Google Scholar 

  13. Gupta Banik B, Bandyopadhyay SK (2018) Novel text steganography using natural language processing and part-of-speech tagging. IETE J Res 66:1–12. https://doi.org/10.1080/03772063.2018.1491807

    Article  Google Scholar 

  14. Hamzah AA, Khattab S, Bayomi H (2019). A linguistic steganography framework using Arabic calligraphy. J King Saud Univ Inf Sci

  15. Kahn D (1996). The history of steganography. In: International Workshop on Information Hiding. pp 1–5

  16. Kerckhoffs A (1883). La cryptographic militaire. J des Sci Mil 5–38

  17. Khairullah MD (2009). A novel text steganography system using font color of the invisible characters in microsoft word documents. In: 2009 second international conference on computer and electrical engineering. Pp 482–484

  18. Khan A, Sarfaraz A (2019) FFT-ETM based distortion less and high payload image steganography. Multimed Tools Appl 78:25999–26022. https://doi.org/10.1007/s11042-019-7664-7

    Article  Google Scholar 

  19. Khosravi B, Khosravi B, Khosravi B, Nazarkardeh K (2019) A new method for pdf steganography in justified texts. J Inf Secur Appl 45:61–70

    Google Scholar 

  20. Kumar R, Chand S, Singh S (2014) An email based high capacity text steganography scheme using combinatorial compression. In: 2014 5th international conference - confluence the next generation information technology summit (confluence). IEEE, Noida, pp 336–339

    Chapter  Google Scholar 

  21. Liu J, Li J, Zhang K, Bhatti UA, Ai Y (2019) Zero-watermarking algorithm for medical images based on dual-tree complex wavelet transform and discrete cosine transform. J Med Imaging Heal Informatics 9:188–194

    Article  Google Scholar 

  22. Maher K (1995). TEXTO. ftp://ftp.funet.fi/pub/crypt/steganography/texto.tar.gz. Accessed 14 Aug 2019

  23. Maji G, Mandal S (2019) Secure and robust image steganography using a reference image as key. Int J Innov Technol Explor Eng 8:2828–2839

    Google Scholar 

  24. Maji G, Mandal S, Debnath NC, Sen S (2019). Pixel value difference based image steganography with one time pad encryption. In: 17th international conference on industrial informatics (INDIN 2019). IEEE

  25. Maji G, Mandal S, Sen S, Debnath NC (2018) Dual image based LSB steganography. In: 2nd international conference on recent advances in signal processing, telecommunications and computing, SIGTELCOM 2018. Ho Chi Minh City, Vietnam, pp 61–66

    Chapter  Google Scholar 

  26. Murphy B, Vogel C (2007). The syntax of concealment: reliable methods for plain text information hiding. In: security, steganography, and watermarking of multimedia contents IX. P 65050Y

  27. Murugan GVK, Uthandipalayam Subramaniyam R (2020) Performance analysis of image steganography using wavelet transform for safe and secured transaction. Multimed Tools Appl 79:9101–9115. https://doi.org/10.1007/s11042-019-7507-6

    Article  Google Scholar 

  28. Nagarhalli TP (2014) A new approach to SMS text steganography using emoticons. Int J Comput Appl 975:8887

    Google Scholar 

  29. Narayana VL, Gopi AP, KUMAR NA (2018) Different techniques for hiding the text information using text steganography techniques: a survey. Ing des Syst d’Information 23:115

    Google Scholar 

  30. Por LY, Wong K, Chee KO (2012) UniSpaCh: a text-based data hiding method using Unicode space characters. J Syst Softw 85:1075–1082

    Article  Google Scholar 

  31. Rabah K (2004) Steganography-the art of hiding data. Inf Technol J 3:245–269

    Article  Google Scholar 

  32. Roy S, Manasmita M (2011). A novel approach to format based text steganography. In: proceedings of the 2011 international conference on communication, Computing & Security. Pp 511–516

  33. Sadek MM, Khalifa AS, Mostafa MGM (2015) Video steganography: a comprehensive review. Multimed Tools Appl 74:7063–7094

    Article  Google Scholar 

  34. Satir E, Isik H (2012) A compression-based text steganography method. J Syst Softw 85:2385–2394

    Article  Google Scholar 

  35. Satir E, Isik H (2014) A Huffman compression based text steganography method. Multimed Tools Appl 70:2085–2110

    Article  Google Scholar 

  36. Shirali-Shahreza M (2008). Text steganography by changing words spelling. In: 2008 10th international conference on advanced communication technology. Pp 1912–1913

  37. Shirali-Shahreza MH, Shirali-Shahreza M (2008). A new synonym text steganography. In: 2008 international conference on intelligent information hiding and multimedia signal processing. Pp 1524–1526

  38. Singh S, Siddiqui TJ (2018). Transform domain techniques for image steganography. In: computer vision: concepts, methodologies, tools, and applications. IGI global, pp 170–186

  39. Tan D, Lu Y, Yan X, Wang X (2019). A simple review of audio steganography. In: 2019 IEEE 3rd information technology, Networking, Electronic and Automation Control Conference (ITNEC). pp 1409–1413

  40. Trithemius J, Heidel WE (1721). Steganographia

  41. Wang F, Huang L, Chen Z, et al (2013). A novel text steganography by context-based equivalent substitution. In: 2013 IEEE international conference on signal processing, communication and computing (ICSPCC 2013). Pp 1–6

  42. Wang Z-H, Kieu TD, Chang C-C, Li M-C (2009). Emoticon-based text steganography in chat. In: 2009 Asia-Pacific conference on computational intelligence and industrial applications (PACIIA). Pp 457–460

  43. Yuling L, Xingming S, Can G, Hong W (2007). An efficient linguistic steganography for Chinese text. In: 2007 IEEE international conference on multimedia and expo. Pp 2094–2097

  44. Zhou X, Gong W, Fu W, Jin L (2016) An improved method for LSB based color image steganography combined with cryptography. In: 2016 IEEE/ACIS 15th international conference on computer and information science (ICIS). IEEE, Okayama, pp 1–4

    Google Scholar 

Download references

Acknowledgments

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giridhar Maji.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Maji, G., Mandal, S. A forward email based high capacity text steganography technique using a randomized and indexed word dictionary. Multimed Tools Appl 79, 26549–26569 (2020). https://doi.org/10.1007/s11042-020-09329-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09329-z

Keywords

Navigation