A Review on Text Steganography Techniques

被引:27
|
作者
Majeed, Mohammed Abdul [1 ]
Sulaiman, Rossilawati [1 ]
Shukur, Zarina [1 ]
Hasan, Mohammad Kamrul [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi 43600, Selangor, Malaysia
关键词
text steganography; data hiding; format-based; linguistic; random and statistic;
D O I
10.3390/math9212829
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
There has been a persistent requirement for safeguarding documents and the data they contain, either in printed or electronic form. This is because the fabrication and faking of documents is prevalent globally, resulting in significant losses for individuals, societies, and industrial sectors, in addition to national security. Therefore, individuals are concerned about protecting their work and avoiding these unlawful actions. Different techniques, such as steganography, cryptography, and coding, have been deployed to protect valuable information. Steganography is an appropriate method, in which the user is able to conceal a message inside another message (cover media). Most of the research on steganography utilizes cover media, such as videos, images, and sounds. Notably, text steganography is usually not given priority because of the difficulties in identifying redundant bits in a text file. To embed information within a document, its attributes must be changed. These attributes may be non-displayed characters, spaces, resized fonts, or purposeful misspellings scattered throughout the text. However, this would be detectable by an attacker or other third party because of the minor change in the document. To address this issue, it is necessary to change the document in such a manner that the change would not be visible to the eye, but could still be decoded using a computer. In this paper, an overview of existing research in this area is provided. First, we provide basic information about text steganography and its general procedure. Next, three classes of text steganography are explained: statistical and random generation, format-based methodologies, and linguistics. The techniques related to each class are analyzed, and particularly the manner in which a unique strategy is provided for hiding secret data. Furthermore, we review the existing works in the development of approaches and algorithms related to text steganography; this review is not exhaustive, and covers research published from 2016 to 2021. This paper aims to assist fellow researchers by compiling the current methods, challenges, and future directions in this field.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] Analysis of Different Text Steganography Techniques : A Survey
    Sharma, Shivani
    Gupta, Avadhesh
    Trivedi, Munesh Chandra
    Yadav, Virendra Kumar
    [J]. 2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2016, : 130 - 133
  • [2] A Review on Security Techniques in Image Steganography
    Ghoul, Sami
    Sulaiman, Rossilawati
    Shukur, Zarina
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 361 - 385
  • [3] Review On Cryptography and Steganography Techniques in Video
    Aiswarya, S.
    Gomathi, R.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 30 - 33
  • [4] Review Paper On Text And Audio Steganography Using GA
    Johri, Prashant
    Kumar, Arun
    Amba
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 190 - 192
  • [5] Review on lightweight cryptography techniques and steganography techniques for IoT environment
    Supriya, K. Sangeetha
    Lovesum, S. P. Jeno
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (09) : 4210 - 4228
  • [6] Review on spatial domain image steganography techniques
    Sirisha, B. Lakshmi
    Mohan, B. Chandra
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1873 - 1883
  • [7] A Review on Video Steganography Techniques in Spatial Domain
    Disha
    Saini, Khushil
    [J]. 2017 RECENT DEVELOPMENTS IN CONTROL, AUTOMATION AND POWER ENGINEERING (RDCAPE), 2017, : 366 - 371
  • [8] Randomization Strategies in Image Steganography Techniques: A Review
    Abadin, A. F. M. Zainul
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 3139 - 3171
  • [9] Secure Text Steganography
    Akhilandeswari, P.
    George, Jabin G.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 : 1 - 7
  • [10] Text steganography in webometrics
    Yaghobi S.R.
    Sajedi H.
    [J]. International Journal of Information Technology, 2021, 13 (2) : 621 - 635