WO2010131939A1 - Text steganography - Google Patents

Text steganography Download PDF

Info

Publication number
WO2010131939A1
WO2010131939A1 PCT/MY2009/000167 MY2009000167W WO2010131939A1 WO 2010131939 A1 WO2010131939 A1 WO 2010131939A1 MY 2009000167 W MY2009000167 W MY 2009000167W WO 2010131939 A1 WO2010131939 A1 WO 2010131939A1
Authority
WO
WIPO (PCT)
Prior art keywords
secret data
text
capacity
cover
cover text
Prior art date
Application number
PCT/MY2009/000167
Other languages
French (fr)
Inventor
Lip Yee Por
Kok Onn Chee
Mei Yin Delina Beh
Original Assignee
Universiti Malaya
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Universiti Malaya filed Critical Universiti Malaya
Publication of WO2010131939A1 publication Critical patent/WO2010131939A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3261Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of multimedia information, e.g. a sound signal
    • H04N2201/3266Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of multimedia information, e.g. a sound signal of text or character information, e.g. text accompanying an image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/328Processing of the additional information
    • H04N2201/3281Encryption; Ciphering

Definitions

  • the present invention relates generally to secure data processing, more particularly to secure data processing involving information hiding in text files.
  • Hidden message can be relayed from a sender to intended recipient in the form of steganography.
  • a message is hidden in an unsuspected matter such as images, articles, shopping list or cover text.
  • Steganography is different from cryptography. Encrypted messages will arouse suspicion. The hidden messages of steganography do not attract attention.
  • steganography An early form of steganography involves the application of invisible ink between visible lines of a private letter. Now, steganography includes the concealment of information within computer files.
  • WO patent application 0025203 teaches a steganographic encoding method for secure transmission or storage of multimedia files.
  • Primary data such as text, image or other digital data is utilized to encode secondary data, such as text, image, or other digital data.
  • Data element from secondary data is performed an operation with the data element of primary data to generate a key element.
  • the primary data may be rearranged according to a predefined or random manner.
  • the key element is then securely transmitted or stored.
  • US patent application 2007223592 describes a method to hide messages in video files.
  • An N-bit data string is encoded into the video where the string includes bits of having value of 1 or 0. If the first bit of the N-bit string comprises a value of 1 , a change is made to the video to represent a value of 1. If the first bit comprises a value of 0, no change is made to the video to represent a value of 0.
  • the second to Nth bits of N-bit string is also hidden in the video with the same operation.
  • US patent application 2009003701 describes a method to embed hidden message in a digital image file.
  • the hidden message in a form of text message is encoded into a series of bits and encrypted before it is merged in an image. Less important information of a bit map image is removed and hidden data is injected in its place.
  • the above mentioned solution involves hiding a message having a relatively small file size within a multimedia file having a relatively large file size. Large file size will involve much more processing steps to encode and decode the hidden message.
  • An alternative method is desired to hide message while reducing processing steps.
  • the proposed invention describes a method to enable users to communicate by embedding a secret data in an innocent cover text.
  • Secret data can be in the form of text documents, image, audio, video or other digital files.
  • the cover text can be chosen by a user or auto-generated by the system to hide the secret data.
  • the chosen cover text needs to be verified if it has a size suitable to hide a selected secret data. Otherwise, a cover text shall be generated (making the duplication of the same cover text) to have a size large enough to hide secret data.
  • White spaces between words and paragraph is used to conceal the secret data.
  • the secret data is first converted into a string by Base64 encoding method.
  • the string is then encrypted to increase the security of secret data.
  • the encrypted data are then transformed into bits.
  • a bit 0 is represented as single space while bit 1 is represented as double space.
  • a method to decode the secret data is also described so that the intended receiver can view the secret data.
  • Fig. 1 illustrates a block diagram of text steganography according to the invention
  • Fig. 2A and 2B illustrate a flow chart of encoding a secret data in a cover text
  • Fig. 3 illustrates a virtual diagram showing the manipulation of white space in a cover text
  • Fig. 4 A and 4B illustrates a flow chart of decoding a secret data from a stego text.
  • a proposed text steganography is used by a sender 10 to send a secret data 12 to the intended receiver 14, as shown in Fig. 1.
  • the secret data 12 is embedded in a cover text 21 so that it does not raise any suspicion to the file.
  • the cover text 21 can be any text based file such as text based files with the file extension of ".doc" and ".txt".
  • the secret data 12 is encoded into Base64 string 16 and go through encryption and Base64 encoding process to become encrypted text 18 with a key before it is embedded into cover text 21 to form a stego text file 22.
  • the stego text file is transmitted into a medium, such as the internet 24.
  • the stego text 22 file can be decoded by the receiver by removing the cover text to unveil the encrypted text 18.
  • the encrypted text is decrypted and decoded by Base64 to become Base64 string 16 and decoded into secret data 12.
  • a sender needs to select a secret data 26 that needs to be sent to the receiver.
  • the sender can opt to define a cover text 27 or the system will auto-generate a cover text 30.
  • the cover text is a typical file with texts.
  • the secret data is converted into bytes using Base64 encoding 32.
  • A be the capacity of the secret data
  • x be the capacity of the secret data after Base64 encoding, excluding the secret data file extension.
  • the relationship of A and x can be shown in the following relationship.
  • the total capacity for the identified secret data is x + ⁇ where ⁇ is the file extension of the secret data file 34.
  • y x ⁇ x + a yi is the capacity of white spaces identified from a predefined cover text.
  • a cover text may have the following text:
  • words are added to the cover text to form a complete cover text.
  • An illustrative example is show below to complete the paragraph after text is added to complete the sentence.
  • ny 2 + O - l) > X + tf , n i, 2, 3...n
  • the sender can choose if the secret data ought to be encrypted 36. If the sender chooses to encrypt the secret data, a user defined public key is used to encrypt the data 38.
  • the encrypted data has a capacity of x + ⁇ + 8.
  • the encrypted data is encoded with Base64 encoding 40.
  • the encoded data has a
  • the cover text length is determined 42.
  • the minimum capacity of white spaces required to accommodate the encoded secret data has the following relationship for the capacity of white space that identified from a predefined cover text, Z 1 .
  • the auto-generated cover text may also be added text to complete the paragraph without arousing suspicion in the following manner.
  • the minimum capacity of the white spaces required to accommodate the encoded data, Z 2 can be identified with the following formula.
  • bit wise dataset 44 is a stream of bits containing a value of 1 or 0. It is later inserted into the white space in the cover text 46. A value of bit 0 is represented with single space while a value of bit 1 is represented with double space.
  • tab spaces are added at the end of sentence or between paragraphs which act as invisible words. Bits of 1 or 0 can be hidden between each tab space. Hence, more bits can be embedded at the end of the sentence or between paragraphs. A stego-text is created after the insertion of bits 22.
  • the first example has a secret data having bit value of 0101 0111 0110 1000 0110 1001 0111..
  • the first bit 0 is placed between text 'The' and 'government' as single space.
  • the second bit 1 is placed between text 'government' and 'had' as double space.
  • the secret data has 28 bits.
  • the cover text has a capacity of 28 white spaces without tab space.
  • the second example has a secret data having bit value of 0101 0111 0110 1000 0110 1001 0111 0100 0110 0101 0101 0011.
  • a line separates the first sentence and the second sentence.
  • Tab spaces are fitted between the first sentence and second sentence.
  • the addition of 20 tab spaces allows 48 bits of data to be hidden in the cover text. Using the same cover text, more bits can be inserted because the bits are hidden between tab spaces that used between paragraphs.
  • the receiver needs to select the specific stego-text received from sender for decoding 72.
  • a password is required as input 78 for the string to be decrypted.
  • the strings are decoded with Base64 decoding process 80.
  • the relationship between capacity of strings, B and capacity of bytes data with file extension after Base64 decoding, x is shown below.
  • the string data or decrypted data will then be detached into bytes data and the extension of the original secret data 84. Later, the file is decoded with Base64 decoding 86. The secret data 12 is retrieved. '
  • the invention discloses a method to hide secret data in a cover text. It is the combination of the above features and its technical advantages give rise to the uniqueness of such invention. Modification can be made to assign bit value of 0 as double space and bit value of 1 as single space. If such arrangement were made, then the decoding of secret data will assign a bit value of 0 to double space and a bit value of 1 to single space to unhide bits in a stego-text file.

Abstract

A method to hide secret data in cover text is described. Secret data is encoded into base64 string. Next, the cover text length is determined (42) to determine minimum capacity of white spaces required to accommodate secret data. Later, data is converted into bits (44). The bits are hidden into cover text (46) wherein bit value of O is represented with single space between text and bit value of 1 is represented with double space between text to form a stego-text (22).

Description

TEXT STEGANOGRAPHY
The present invention relates generally to secure data processing, more particularly to secure data processing involving information hiding in text files.
BACKGROUND OF THE INVENTION
Hidden message can be relayed from a sender to intended recipient in the form of steganography. Generally a message is hidden in an unsuspected matter such as images, articles, shopping list or cover text. Steganography is different from cryptography. Encrypted messages will arouse suspicion. The hidden messages of steganography do not attract attention.
An early form of steganography involves the application of invisible ink between visible lines of a private letter. Now, steganography includes the concealment of information within computer files.
WO patent application 0025203 teaches a steganographic encoding method for secure transmission or storage of multimedia files. Primary data such as text, image or other digital data is utilized to encode secondary data, such as text, image, or other digital data. Data element from secondary data is performed an operation with the data element of primary data to generate a key element. The primary data may be rearranged according to a predefined or random manner. The key element is then securely transmitted or stored.
US patent application 2007223592 describes a method to hide messages in video files. An N-bit data string is encoded into the video where the string includes bits of having value of 1 or 0. If the first bit of the N-bit string comprises a value of 1 , a change is made to the video to represent a value of 1. If the first bit comprises a value of 0, no change is made to the video to represent a value of 0. The second to Nth bits of N-bit string is also hidden in the video with the same operation.
US patent application 2009003701 describes a method to embed hidden message in a digital image file. The hidden message in a form of text message is encoded into a series of bits and encrypted before it is merged in an image. Less important information of a bit map image is removed and hidden data is injected in its place. The above mentioned solution involves hiding a message having a relatively small file size within a multimedia file having a relatively large file size. Large file size will involve much more processing steps to encode and decode the hidden message. An alternative method is desired to hide message while reducing processing steps.
SUMMARY OF THE INVENTION
The proposed invention describes a method to enable users to communicate by embedding a secret data in an innocent cover text. Secret data can be in the form of text documents, image, audio, video or other digital files.
The cover text can be chosen by a user or auto-generated by the system to hide the secret data. The chosen cover text needs to be verified if it has a size suitable to hide a selected secret data. Otherwise, a cover text shall be generated (making the duplication of the same cover text) to have a size large enough to hide secret data.
White spaces between words and paragraph is used to conceal the secret data. The secret data is first converted into a string by Base64 encoding method. The string is then encrypted to increase the security of secret data. The encrypted data are then transformed into bits. A bit 0 is represented as single space while bit 1 is represented as double space.
A method to decode the secret data is also described so that the intended receiver can view the secret data.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will now be described in greater detail, by way of an example, with reference to the accompanying drawings, in which:
Fig. 1 illustrates a block diagram of text steganography according to the invention;
Fig. 2A and 2B illustrate a flow chart of encoding a secret data in a cover text;
Fig. 3 illustrates a virtual diagram showing the manipulation of white space in a cover text; and Fig. 4 A and 4B illustrates a flow chart of decoding a secret data from a stego text.
DETAILED DESCRIPTION OF THE DRAWINGS
A proposed text steganography is used by a sender 10 to send a secret data 12 to the intended receiver 14, as shown in Fig. 1. The secret data 12 is embedded in a cover text 21 so that it does not raise any suspicion to the file. The cover text 21 can be any text based file such as text based files with the file extension of ".doc" and ".txt".
The secret data 12 is encoded into Base64 string 16 and go through encryption and Base64 encoding process to become encrypted text 18 with a key before it is embedded into cover text 21 to form a stego text file 22. The stego text file is transmitted into a medium, such as the internet 24. The stego text 22 file can be decoded by the receiver by removing the cover text to unveil the encrypted text 18. The encrypted text is decrypted and decoded by Base64 to become Base64 string 16 and decoded into secret data 12.
The encoding process will be described in detail with reference to Fig. 2A and 2B. First, a sender needs to select a secret data 26 that needs to be sent to the receiver.
After selecting the secret data 12, the sender can opt to define a cover text 27 or the system will auto-generate a cover text 30. The cover text is a typical file with texts.
Next, the secret data is converted into bytes using Base64 encoding 32. Let A be the capacity of the secret data and x be the capacity of the secret data after Base64 encoding, excluding the secret data file extension. The relationship of A and x can be shown in the following relationship.
4A X = 3
The total capacity for the identified secret data is x + α where α is the file extension of the secret data file 34. Should the sender choose to auto-generate a cover text 30, the system will identify if the minimum capacity of white spaces required to accommodate total capacity of secret data, x + α is fulfilled with the following relationship.
yx ≥ x + a yi is the capacity of white spaces identified from a predefined cover text.
' The mentioned relationship optimizes the size of generated text file but it may raise suspicion if there are incomplete words or sentence in the cover text. For example a cover text may have the following text:
...the Han Dynasty when incompetent eunuchs deceived the emperor and banished good officials. The government had become extremely corrupt on all levels, leading to widespread deterioration of the empire. During the reign of the penultimate Han emperor, Emperor Ling, the Yellow Turban
In order to alleviate the situation, a minimum capacity of extra text required to construct a full sentence, β is added to the predefined cover text. A new formula is formed as follows:
yx + β ≥ x + a
Hence, words are added to the cover text to form a complete cover text. An illustrative example is show below to complete the paragraph after text is added to complete the sentence.
... the Han Dynasty when incompetent eunuchs deceived the. emperor and banished good officials. The government had become extremely corrupt on all levels, leading to widespread deterioration of the empire. During the reign of the penultimate Han emperor, Emperor Ling, the Yellow Turban Rebellion broke out under the leadership of Zhang Jiao, who allegedly practiced Taoist wizardry. If a sender defines a cover text 27, instead of auto-generating a cover text, the cover text will be analyzed to identify the capacity of the white space in the cover text. If the defined cover text does not have sufficient white space to accommodate secret data then the cover text will be duplicated to produce sufficient white space. The following duplication formula is used where y2 refers to the, capacity of white space of cover text and n is the number of duplication required.
ny2 + O - l) > X + tf ,n= i, 2, 3...n
Later,, the sender can choose if the secret data ought to be encrypted 36. If the sender chooses to encrypt the secret data, a user defined public key is used to encrypt the data 38. The encrypted data has a capacity of x + α + 8. Next, the encrypted data is encoded with Base64 encoding 40. The encoded data has a
4(x+a+8) capacity of 3 bytes.
Next, the cover text length is determined 42. For auto-generated cover text, the minimum capacity of white spaces required to accommodate the encoded secret data has the following relationship for the capacity of white space that identified from a predefined cover text, Z1.
+ 8)
7 s> —
The auto-generated cover text may also be added text to complete the paragraph without arousing suspicion in the following manner.
z + β > 4(*+*+g)
If the sender defines a cover text, the minimum capacity of the white spaces required to accommodate the encoded data, Z2 can be identified with the following formula.
Figure imgf000007_0001
After that, the secret data is converted into bit wise dataset 44 before it is hidden into cover text. The bit wise dataset is a stream of bits containing a value of 1 or 0. It is later inserted into the white space in the cover text 46. A value of bit 0 is represented with single space while a value of bit 1 is represented with double space.
To fully make use of white space in a document, tab spaces are added at the end of sentence or between paragraphs which act as invisible words. Bits of 1 or 0 can be hidden between each tab space. Hence, more bits can be embedded at the end of the sentence or between paragraphs. A stego-text is created after the insertion of bits 22.
Two examples of how bits are embedded in cover text are shown in Fig. 3. The first example has a secret data having bit value of 0101 0111 0110 1000 0110 1001 0111.. The first bit 0 is placed between text 'The' and 'government' as single space. The second bit 1 is placed between text 'government' and 'had' as double space. The secret data has 28 bits. The cover text has a capacity of 28 white spaces without tab space.
The second example has a secret data having bit value of 0101 0111 0110 1000 0110 1001 0111 0100 0110 0101 0101 0011. A line separates the first sentence and the second sentence. Tab spaces are fitted between the first sentence and second sentence. There are 20 tab spaces fitted between the lines. The addition of 20 tab spaces allows 48 bits of data to be hidden in the cover text. Using the same cover text, more bits can be inserted because the bits are hidden between tab spaces that used between paragraphs.
Now the decoding process of text steganography will be described. The receiver needs to select the specific stego-text received from sender for decoding 72.
After selecting the stego-text, all the spaces in the text are analyzed to unhide bits 74. Single space between cover text is assigned a bit value of 0 while double space between text is assigned a bit value of 1. The identified bits are combined into a bit wise dataset. The bit wise dataset is later converted into strings of characters 76.
If the string is encrypted, a password is required as input 78 for the string to be decrypted. The strings are decoded with Base64 decoding process 80. The relationship between capacity of strings, B and capacity of bytes data with file extension after Base64 decoding, x is shown below.
Λ ~~ 4 The system will then decrypt bytes data with a receiver provided public key 82.
The string data or decrypted data will then be detached into bytes data and the extension of the original secret data 84. Later, the file is decoded with Base64 decoding 86. The secret data 12 is retrieved. '
Accordingly, the invention discloses a method to hide secret data in a cover text. It is the combination of the above features and its technical advantages give rise to the uniqueness of such invention. Modification can be made to assign bit value of 0 as double space and bit value of 1 as single space. If such arrangement were made, then the decoding of secret data will assign a bit value of 0 to double space and a bit value of 1 to single space to unhide bits in a stego-text file. Although the descriptions above contain much specificity, these should not be construed as limiting the scope of the embodiment but as merely providing illustrations of some of the presently preferred embodiments.

Claims

1. A method to hide secret data in cover text comprising the steps of: encoding secret data into base64 string (32); determining cover text length (42) to determine minimum capacity of white spaces required to accommodate secret data; converting data to bits (44); hide bits into cover text (46); wherein bit value of 0 is represented with single space between text and bit value of 1 is represented with double space between text to form a stego-text
(22).
2. A method to hide secret data in cover text according to claim 1 , further comprising: defining a cover text (27); if the defined cover text does not have sufficient white space to accommodate secret data then the cover text will be duplicated, n times to produce sufficient white space; determining cover text length (42) to determine minimum capacity of white spaces required to accommodate secret data from the following formula
wj£ +(«-!) >x+α n s= ^ 2j 3...n where y2 refers to the capacity of white space of cover text, n is the number of duplication required, x is the capacity of secret data after base64 encoding, excluding secret data file extension, and α is the file extension of the secret data file.
3. A method to hide secret data in cover text according to claim 1 , further comprising: defining a cover text (27); encrypting the secret data (38); if the defined cover text does not have sufficient white space to accommodate secret data then the cover text will be duplicated, n times to produce sufficient white space; determining cover text length (42) to determine minimum capacity of white spaces required to accommodate secret data from the following formula nz2 Z +( vn-ϊ) / ≥^ψ 3 ^ , n = 11,22,33...n n where n is the number of duplication, Z2 is the minimum capacity of white spaces required to accommodate encoded data; x is the capacity of secret data after base64 encoding, excluding secret data file extension, and α is the file extension of the secret data file.
4. A method to hide secret data in cover text according to claim 1 , further comprising: auto-generating cover text (30); identifying if the minimum capacity of white spaces required to accommodate total capacity of secret data is fulfilled; determining cover text length (42) to determine minimum capacity of white spaces required to accommodate secret data from the following formula
y x > x + a where y-, is the capacity of white spaces identified from a predefined cover text, x is the capacity of secret data after base64 encoding, excluding secret data file extension, and α is the file extension of the secret data file.
5. A method to hide secret data in cover text according to claim 1 , further comprising: auto-generating cover text (30); encrypting the secret data (38); identifying if the minimum capacity of white spaces required to accommodate total capacity of secret data is fulfilled; determining cover text length (42) to determine minimum capacity of white spaces required to accommodate secret data from the following formula
Z 1 > ^ 4 ( x + 3 a + 8 )
where Z1 is the minimum capacity of white spaces required to accommodate encoded data; x is the capacity of secret data after base64 encoding, excluding secret data file extension, and α is the file extension of the secret data file.
6. A method to hide secret data in cover text according to claim 1 , further comprising: auto-generating cover text (30); identifying if the minimum capacity of white spaces required to accommodate total capacity of secret data is fulfilled; adding a minimum capacity of extra text, β which is required to construct a full sentence; determining, cover text length (42) to determine minimum capacity of white spaces required to accommodate secret data from the following formula y} + β ≥ x + a where y^ is the capacity of white spaces identified from a predefined coyer text, β is the number of added text, x is the capacity of secret data after base64 encoding, excluding secret data file extension, and α is the file extension of the secret data file.
7. A method to hide secret data in cover text according to claim 1 , further comprising: auto-generating cover text (30); encrypting the secret data (38); identifying if the minimum capacity of white spaces required to accommodate total capacity of secret data is fulfilled; adding a minimum capacity of extra text, β which is required to construct a full sentence; determining cover text length (42) to determine minimum capacity of white spaces required to accommodate secret data from the following formula
Figure imgf000011_0001
where Z1 is the minimum capacity of white spaces required to accommodate encoded data; β is the number of added text, x is the capacity of secret data after base64 encoding, excluding secret data file extension, and α is the file extension of the secret data file.
8. A method to hide secret data in cover text according to claim 1 , further comprising addition of tab spaces at the end of sentences or between paragraphs which act as invisible words.
9. A method to decode secret data in cover text according to claim 1 , comprising the steps of: unhiding bits of stego-file (74) by assigning bit value of 0 to single space and § bit value of 1 to double space; converting bits to string (76); detaching secret data file extension (84); decoding with base64 decoding (86); wherein secret data (12) is retrieved. 0
10. A method to decode secret data in cover text according to claim 9, further comprising decrypting the string (82) if a password is required as input.
11. A method to hide secret data in cover text according to claim 1 , wherein bit value5 of 0 is represented with double space between text and bit value of 1 is represented with single space between text to form a stego-text (22).
12. A method to decode secret data in cover text according to claim 9 and 11 , comprising the steps of unhiding bits of stego-text file (74) by assigning bit value0 of 0 to double space and bit value of 1 to single space.
PCT/MY2009/000167 2009-05-14 2009-10-13 Text steganography WO2010131939A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
MYPI20091960 MY147993A (en) 2009-05-14 2009-05-14 Text steganography
MYPI20091960 2009-05-14

Publications (1)

Publication Number Publication Date
WO2010131939A1 true WO2010131939A1 (en) 2010-11-18

Family

ID=43085190

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/MY2009/000167 WO2010131939A1 (en) 2009-05-14 2009-10-13 Text steganography

Country Status (2)

Country Link
MY (1) MY147993A (en)
WO (1) WO2010131939A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108271027A (en) * 2018-01-10 2018-07-10 中国人民解放军战略支援部队信息工程大学 A kind of extracting method of image adaptive secret information
CN108462553A (en) * 2017-02-17 2018-08-28 中国移动通信集团内蒙古有限公司 A kind of data transmission method, device and electronic equipment
CN109995503A (en) * 2019-03-11 2019-07-09 青岛大学 A kind of electron grid building method based on key
CN111447188A (en) * 2020-03-20 2020-07-24 青岛大学 Carrier-free text steganography method based on language steganography feature space
US10755375B2 (en) 2017-02-24 2020-08-25 The Trustees Of Columbia University In The City Of New York Systems and methods for steganography based on text fonts
CN114386103A (en) * 2022-01-14 2022-04-22 北京邮电大学 Secret information hiding method, secret information extracting method and transmission system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5861619A (en) * 1995-12-28 1999-01-19 Oki Electric Industry Co., Ltd. Method of and apparatus for embedding data into an electronic document by modulating spaces between words
US20040236716A1 (en) * 2001-06-12 2004-11-25 Carro Fernando Incerits Methods of invisibly embedding and hiding data into soft-copy text documents
US20050039021A1 (en) * 2003-06-23 2005-02-17 Alattar Adnan M. Watermarking electronic text documents
US20060257002A1 (en) * 2005-01-03 2006-11-16 Yun-Qing Shi System and method for data hiding using inter-word space modulation
US20070014429A1 (en) * 2005-07-14 2007-01-18 Yuan He Embedding and detecting watermarks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5861619A (en) * 1995-12-28 1999-01-19 Oki Electric Industry Co., Ltd. Method of and apparatus for embedding data into an electronic document by modulating spaces between words
US20040236716A1 (en) * 2001-06-12 2004-11-25 Carro Fernando Incerits Methods of invisibly embedding and hiding data into soft-copy text documents
US20050039021A1 (en) * 2003-06-23 2005-02-17 Alattar Adnan M. Watermarking electronic text documents
US20060257002A1 (en) * 2005-01-03 2006-11-16 Yun-Qing Shi System and method for data hiding using inter-word space modulation
US20070014429A1 (en) * 2005-07-14 2007-01-18 Yuan He Embedding and detecting watermarks

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108462553A (en) * 2017-02-17 2018-08-28 中国移动通信集团内蒙古有限公司 A kind of data transmission method, device and electronic equipment
CN108462553B (en) * 2017-02-17 2021-04-13 中国移动通信集团内蒙古有限公司 Data transmission method and device and electronic equipment
US10755375B2 (en) 2017-02-24 2020-08-25 The Trustees Of Columbia University In The City Of New York Systems and methods for steganography based on text fonts
CN108271027A (en) * 2018-01-10 2018-07-10 中国人民解放军战略支援部队信息工程大学 A kind of extracting method of image adaptive secret information
CN108271027B (en) * 2018-01-10 2020-06-12 中国人民解放军战略支援部队信息工程大学 Method for extracting image self-adaptive secret information
CN109995503A (en) * 2019-03-11 2019-07-09 青岛大学 A kind of electron grid building method based on key
CN111447188A (en) * 2020-03-20 2020-07-24 青岛大学 Carrier-free text steganography method based on language steganography feature space
CN111447188B (en) * 2020-03-20 2022-03-18 青岛大学 Carrier-free text steganography method based on language steganography feature space
CN114386103A (en) * 2022-01-14 2022-04-22 北京邮电大学 Secret information hiding method, secret information extracting method and transmission system

Also Published As

Publication number Publication date
MY147993A (en) 2013-02-28

Similar Documents

Publication Publication Date Title
JP3989433B2 (en) A method for embedding and hiding data so that it is not visible in a soft copy text document
US6769061B1 (en) Invisible encoding of meta-information
Thampi Information hiding techniques: a tutorial review
Roy et al. A novel approach to format based text steganography
AU2013204619B2 (en) Methods, apparatus and articles of manufacture to encode auxilary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data
WO2010131939A1 (en) Text steganography
Bhowal et al. Audio steganography using GA
KR101962275B1 (en) Encryption and decryption method for steganography data based on moving picture
Alginahi et al. An enhanced Kashida-based watermarking approach for increased protection in Arabic text-documents based on frequency recurrence of characters
Kumar et al. An efficient text steganography scheme using Unicode Space Characters
Abduallah et al. New Data hiding method based on DNA and Vigenere Autokey
Dickman An overview of steganography
Rafat et al. Secure digital steganography for ASCII text documents
Ali A new text steganography method by using non-printing unicode characters
Choche et al. A methodology to conceal QR codes for security applications
Kadhim A new audio steganography system based on auto-key generator
Priyanka et al. Audio steganography using LSB
Arora Types and tools of steganography
Saber et al. Steganography in MS excel document using unicode system characteristics
Por et al. An enhanced embedding method using inter-sentence, inter-word, end-of-line and inter-paragraph spacing
Mandolkar RSE for electronic text document protection
Gandhi et al. Steganography—A Sin qua non for Diguised Communication
Duraiswamy et al. Security through obscurity
Ganeshkumar et al. Secured communication using Steganography Framework with sample RTF implementation
Htet et al. A Novel Text Steganographic Technique Using Specific Alphabets

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09844704

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09844704

Country of ref document: EP

Kind code of ref document: A1