Enhancement of text steganography technique using Lempel-Ziv-Welch algorithm and two-letter word technique

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Text steganography is regarded as the most challenging type to hide secret data to a text file because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party) issues of text steganography. Generally, the data hiding capacity of text steganography is limited, and imperceptibility is very poor. Therefore, a new scheme was suggested to improve the two-letter word technique by using the Lempel-Ziv-Welch algorithm. This scheme can hide 4 bits in each position of a two-letter word in the cover text by inserting a nonprinting Unicode symbol. Each two-letter word can have four different locations in the text. Some experiments were conducted on the proposed method (enhancement) and our previous method (two-letter word) to compare their performance applying twelve secret message samples in terms of capacity and Jaro-Winkler. On the other hand, the performance of our proposed method was compared with other related studies in terms of capacity. The results show that the proposed method not only had a high embedding capacity but also reduced the growing size ratio between the original cover and stego cover. In addition, the security of the proposed approach was improved through improving imperceptibility and by using stego-key.

LanguageEnglish
Title of host publicationRecent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018
EditorsFathey Mohammed, Faisal Saeed, Nadhmi Gazem, Abdelsalam Busalim
PublisherSpringer Verlag
Pages525-537
Number of pages13
ISBN (Print)9783319990064
DOIs
Publication statusPublished - 1 Jan 2019
Event3rd International Conference of Reliable Information and Communication Technology, IRICT 2018 - Kuala Lumpur, Malaysia
Duration: 23 Jun 201824 Jun 2018

Publication series

NameAdvances in Intelligent Systems and Computing
Volume843
ISSN (Print)2194-5357

Other

Other3rd International Conference of Reliable Information and Communication Technology, IRICT 2018
CountryMalaysia
CityKuala Lumpur
Period23/6/1824/6/18

Fingerprint

Steganography
Experiments

Keywords

  • Capacity
  • Compression
  • Information security
  • Steganography

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science(all)

Cite this

Baawi, S. S., Mokhtar, M. R., & Sulaiman, R. (2019). Enhancement of text steganography technique using Lempel-Ziv-Welch algorithm and two-letter word technique. In F. Mohammed, F. Saeed, N. Gazem, & A. Busalim (Eds.), Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018 (pp. 525-537). (Advances in Intelligent Systems and Computing; Vol. 843). Springer Verlag. https://doi.org/10.1007/978-3-319-99007-1_49

Enhancement of text steganography technique using Lempel-Ziv-Welch algorithm and two-letter word technique. / Baawi, Salwa Shakir; Mokhtar, Mohd Rosmadi; Sulaiman, Rossilawati.

Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. ed. / Fathey Mohammed; Faisal Saeed; Nadhmi Gazem; Abdelsalam Busalim. Springer Verlag, 2019. p. 525-537 (Advances in Intelligent Systems and Computing; Vol. 843).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Baawi, SS, Mokhtar, MR & Sulaiman, R 2019, Enhancement of text steganography technique using Lempel-Ziv-Welch algorithm and two-letter word technique. in F Mohammed, F Saeed, N Gazem & A Busalim (eds), Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. Advances in Intelligent Systems and Computing, vol. 843, Springer Verlag, pp. 525-537, 3rd International Conference of Reliable Information and Communication Technology, IRICT 2018, Kuala Lumpur, Malaysia, 23/6/18. https://doi.org/10.1007/978-3-319-99007-1_49
Baawi SS, Mokhtar MR, Sulaiman R. Enhancement of text steganography technique using Lempel-Ziv-Welch algorithm and two-letter word technique. In Mohammed F, Saeed F, Gazem N, Busalim A, editors, Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. Springer Verlag. 2019. p. 525-537. (Advances in Intelligent Systems and Computing). https://doi.org/10.1007/978-3-319-99007-1_49
Baawi, Salwa Shakir ; Mokhtar, Mohd Rosmadi ; Sulaiman, Rossilawati. / Enhancement of text steganography technique using Lempel-Ziv-Welch algorithm and two-letter word technique. Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. editor / Fathey Mohammed ; Faisal Saeed ; Nadhmi Gazem ; Abdelsalam Busalim. Springer Verlag, 2019. pp. 525-537 (Advances in Intelligent Systems and Computing).
@inproceedings{92565ea3f456483f822a73d1ab7f979d,
title = "Enhancement of text steganography technique using Lempel-Ziv-Welch algorithm and two-letter word technique",
abstract = "Text steganography is regarded as the most challenging type to hide secret data to a text file because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party) issues of text steganography. Generally, the data hiding capacity of text steganography is limited, and imperceptibility is very poor. Therefore, a new scheme was suggested to improve the two-letter word technique by using the Lempel-Ziv-Welch algorithm. This scheme can hide 4 bits in each position of a two-letter word in the cover text by inserting a nonprinting Unicode symbol. Each two-letter word can have four different locations in the text. Some experiments were conducted on the proposed method (enhancement) and our previous method (two-letter word) to compare their performance applying twelve secret message samples in terms of capacity and Jaro-Winkler. On the other hand, the performance of our proposed method was compared with other related studies in terms of capacity. The results show that the proposed method not only had a high embedding capacity but also reduced the growing size ratio between the original cover and stego cover. In addition, the security of the proposed approach was improved through improving imperceptibility and by using stego-key.",
keywords = "Capacity, Compression, Information security, Steganography",
author = "Baawi, {Salwa Shakir} and Mokhtar, {Mohd Rosmadi} and Rossilawati Sulaiman",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-3-319-99007-1_49",
language = "English",
isbn = "9783319990064",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer Verlag",
pages = "525--537",
editor = "Fathey Mohammed and Faisal Saeed and Nadhmi Gazem and Abdelsalam Busalim",
booktitle = "Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018",

}

TY - GEN

T1 - Enhancement of text steganography technique using Lempel-Ziv-Welch algorithm and two-letter word technique

AU - Baawi, Salwa Shakir

AU - Mokhtar, Mohd Rosmadi

AU - Sulaiman, Rossilawati

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Text steganography is regarded as the most challenging type to hide secret data to a text file because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party) issues of text steganography. Generally, the data hiding capacity of text steganography is limited, and imperceptibility is very poor. Therefore, a new scheme was suggested to improve the two-letter word technique by using the Lempel-Ziv-Welch algorithm. This scheme can hide 4 bits in each position of a two-letter word in the cover text by inserting a nonprinting Unicode symbol. Each two-letter word can have four different locations in the text. Some experiments were conducted on the proposed method (enhancement) and our previous method (two-letter word) to compare their performance applying twelve secret message samples in terms of capacity and Jaro-Winkler. On the other hand, the performance of our proposed method was compared with other related studies in terms of capacity. The results show that the proposed method not only had a high embedding capacity but also reduced the growing size ratio between the original cover and stego cover. In addition, the security of the proposed approach was improved through improving imperceptibility and by using stego-key.

AB - Text steganography is regarded as the most challenging type to hide secret data to a text file because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party) issues of text steganography. Generally, the data hiding capacity of text steganography is limited, and imperceptibility is very poor. Therefore, a new scheme was suggested to improve the two-letter word technique by using the Lempel-Ziv-Welch algorithm. This scheme can hide 4 bits in each position of a two-letter word in the cover text by inserting a nonprinting Unicode symbol. Each two-letter word can have four different locations in the text. Some experiments were conducted on the proposed method (enhancement) and our previous method (two-letter word) to compare their performance applying twelve secret message samples in terms of capacity and Jaro-Winkler. On the other hand, the performance of our proposed method was compared with other related studies in terms of capacity. The results show that the proposed method not only had a high embedding capacity but also reduced the growing size ratio between the original cover and stego cover. In addition, the security of the proposed approach was improved through improving imperceptibility and by using stego-key.

KW - Capacity

KW - Compression

KW - Information security

KW - Steganography

UR - http://www.scopus.com/inward/record.url?scp=85053868910&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85053868910&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-99007-1_49

DO - 10.1007/978-3-319-99007-1_49

M3 - Conference contribution

SN - 9783319990064

T3 - Advances in Intelligent Systems and Computing

SP - 525

EP - 537

BT - Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018

A2 - Mohammed, Fathey

A2 - Saeed, Faisal

A2 - Gazem, Nadhmi

A2 - Busalim, Abdelsalam

PB - Springer Verlag

ER -