Abstract
Text steganography is regarded as the most challenging type to hide secret data to a text file because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party) issues of text steganography. Generally, the data hiding capacity of text steganography is limited, and imperceptibility is very poor. Therefore, a new scheme was suggested to improve the two-letter word technique by using the Lempel-Ziv-Welch algorithm. This scheme can hide 4 bits in each position of a two-letter word in the cover text by inserting a nonprinting Unicode symbol. Each two-letter word can have four different locations in the text. Some experiments were conducted on the proposed method (enhancement) and our previous method (two-letter word) to compare their performance applying twelve secret message samples in terms of capacity and Jaro-Winkler. On the other hand, the performance of our proposed method was compared with other related studies in terms of capacity. The results show that the proposed method not only had a high embedding capacity but also reduced the growing size ratio between the original cover and stego cover. In addition, the security of the proposed approach was improved through improving imperceptibility and by using stego-key.
Language | English |
---|---|
Title of host publication | Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018 |
Editors | Fathey Mohammed, Faisal Saeed, Nadhmi Gazem, Abdelsalam Busalim |
Publisher | Springer Verlag |
Pages | 525-537 |
Number of pages | 13 |
ISBN (Print) | 9783319990064 |
DOIs | |
Publication status | Published - 1 Jan 2019 |
Event | 3rd International Conference of Reliable Information and Communication Technology, IRICT 2018 - Kuala Lumpur, Malaysia Duration: 23 Jun 2018 → 24 Jun 2018 |
Publication series
Name | Advances in Intelligent Systems and Computing |
---|---|
Volume | 843 |
ISSN (Print) | 2194-5357 |
Other
Other | 3rd International Conference of Reliable Information and Communication Technology, IRICT 2018 |
---|---|
Country | Malaysia |
City | Kuala Lumpur |
Period | 23/6/18 → 24/6/18 |
Fingerprint
Keywords
- Capacity
- Compression
- Information security
- Steganography
ASJC Scopus subject areas
- Control and Systems Engineering
- Computer Science(all)
Cite this
Enhancement of text steganography technique using Lempel-Ziv-Welch algorithm and two-letter word technique. / Baawi, Salwa Shakir; Mokhtar, Mohd Rosmadi; Sulaiman, Rossilawati.
Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. ed. / Fathey Mohammed; Faisal Saeed; Nadhmi Gazem; Abdelsalam Busalim. Springer Verlag, 2019. p. 525-537 (Advances in Intelligent Systems and Computing; Vol. 843).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
}
TY - GEN
T1 - Enhancement of text steganography technique using Lempel-Ziv-Welch algorithm and two-letter word technique
AU - Baawi, Salwa Shakir
AU - Mokhtar, Mohd Rosmadi
AU - Sulaiman, Rossilawati
PY - 2019/1/1
Y1 - 2019/1/1
N2 - Text steganography is regarded as the most challenging type to hide secret data to a text file because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party) issues of text steganography. Generally, the data hiding capacity of text steganography is limited, and imperceptibility is very poor. Therefore, a new scheme was suggested to improve the two-letter word technique by using the Lempel-Ziv-Welch algorithm. This scheme can hide 4 bits in each position of a two-letter word in the cover text by inserting a nonprinting Unicode symbol. Each two-letter word can have four different locations in the text. Some experiments were conducted on the proposed method (enhancement) and our previous method (two-letter word) to compare their performance applying twelve secret message samples in terms of capacity and Jaro-Winkler. On the other hand, the performance of our proposed method was compared with other related studies in terms of capacity. The results show that the proposed method not only had a high embedding capacity but also reduced the growing size ratio between the original cover and stego cover. In addition, the security of the proposed approach was improved through improving imperceptibility and by using stego-key.
AB - Text steganography is regarded as the most challenging type to hide secret data to a text file because it is not enough unnecessary information compared with other carrier files. This study aimed to deal with the capacity (how much data can be hidden in the cover carrier) and security (the inability of disclosing the data by an unauthorized party) issues of text steganography. Generally, the data hiding capacity of text steganography is limited, and imperceptibility is very poor. Therefore, a new scheme was suggested to improve the two-letter word technique by using the Lempel-Ziv-Welch algorithm. This scheme can hide 4 bits in each position of a two-letter word in the cover text by inserting a nonprinting Unicode symbol. Each two-letter word can have four different locations in the text. Some experiments were conducted on the proposed method (enhancement) and our previous method (two-letter word) to compare their performance applying twelve secret message samples in terms of capacity and Jaro-Winkler. On the other hand, the performance of our proposed method was compared with other related studies in terms of capacity. The results show that the proposed method not only had a high embedding capacity but also reduced the growing size ratio between the original cover and stego cover. In addition, the security of the proposed approach was improved through improving imperceptibility and by using stego-key.
KW - Capacity
KW - Compression
KW - Information security
KW - Steganography
UR - http://www.scopus.com/inward/record.url?scp=85053868910&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85053868910&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-99007-1_49
DO - 10.1007/978-3-319-99007-1_49
M3 - Conference contribution
SN - 9783319990064
T3 - Advances in Intelligent Systems and Computing
SP - 525
EP - 537
BT - Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018
A2 - Mohammed, Fathey
A2 - Saeed, Faisal
A2 - Gazem, Nadhmi
A2 - Busalim, Abdelsalam
PB - Springer Verlag
ER -