A Review on Text Steganography Techniques

There has been a persistent requirement for safeguarding documents and the data they contain, either in printed or electronic form. This is because the fabrication and faking of documents is prevalent globally, resulting in significant losses for individuals, societies, and industrial sectors, in ad...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Mohammed Abdul Majeed, Rossilawati Sulaiman, Zarina Shukur, Mohammad Kamrul Hasan
Formato: article
Lenguaje:EN
Publicado: MDPI AG 2021
Materias:
Acceso en línea:https://doaj.org/article/b8cb29df8ae44b2fb8aab4173ec498b3
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:b8cb29df8ae44b2fb8aab4173ec498b3
record_format dspace
spelling oai:doaj.org-article:b8cb29df8ae44b2fb8aab4173ec498b32021-11-11T18:21:21ZA Review on Text Steganography Techniques10.3390/math92128292227-7390https://doaj.org/article/b8cb29df8ae44b2fb8aab4173ec498b32021-11-01T00:00:00Zhttps://www.mdpi.com/2227-7390/9/21/2829https://doaj.org/toc/2227-7390There has been a persistent requirement for safeguarding documents and the data they contain, either in printed or electronic form. This is because the fabrication and faking of documents is prevalent globally, resulting in significant losses for individuals, societies, and industrial sectors, in addition to national security. Therefore, individuals are concerned about protecting their work and avoiding these unlawful actions. Different techniques, such as steganography, cryptography, and coding, have been deployed to protect valuable information. Steganography is an appropriate method, in which the user is able to conceal a message inside another message (cover media). Most of the research on steganography utilizes cover media, such as videos, images, and sounds. Notably, text steganography is usually not given priority because of the difficulties in identifying redundant bits in a text file. To embed information within a document, its attributes must be changed. These attributes may be non-displayed characters, spaces, resized fonts, or purposeful misspellings scattered throughout the text. However, this would be detectable by an attacker or other third party because of the minor change in the document. To address this issue, it is necessary to change the document in such a manner that the change would not be visible to the eye, but could still be decoded using a computer. In this paper, an overview of existing research in this area is provided. First, we provide basic information about text steganography and its general procedure. Next, three classes of text steganography are explained: statistical and random generation, format-based methodologies, and linguistics. The techniques related to each class are analyzed, and particularly the manner in which a unique strategy is provided for hiding secret data. Furthermore, we review the existing works in the development of approaches and algorithms related to text steganography; this review is not exhaustive, and covers research published from 2016 to 2021. This paper aims to assist fellow researchers by compiling the current methods, challenges, and future directions in this field.Mohammed Abdul MajeedRossilawati SulaimanZarina ShukurMohammad Kamrul HasanMDPI AGarticletext steganographydata hidingformat-basedlinguisticrandom and statisticMathematicsQA1-939ENMathematics, Vol 9, Iss 2829, p 2829 (2021)
institution DOAJ
collection DOAJ
language EN
topic text steganography
data hiding
format-based
linguistic
random and statistic
Mathematics
QA1-939
spellingShingle text steganography
data hiding
format-based
linguistic
random and statistic
Mathematics
QA1-939
Mohammed Abdul Majeed
Rossilawati Sulaiman
Zarina Shukur
Mohammad Kamrul Hasan
A Review on Text Steganography Techniques
description There has been a persistent requirement for safeguarding documents and the data they contain, either in printed or electronic form. This is because the fabrication and faking of documents is prevalent globally, resulting in significant losses for individuals, societies, and industrial sectors, in addition to national security. Therefore, individuals are concerned about protecting their work and avoiding these unlawful actions. Different techniques, such as steganography, cryptography, and coding, have been deployed to protect valuable information. Steganography is an appropriate method, in which the user is able to conceal a message inside another message (cover media). Most of the research on steganography utilizes cover media, such as videos, images, and sounds. Notably, text steganography is usually not given priority because of the difficulties in identifying redundant bits in a text file. To embed information within a document, its attributes must be changed. These attributes may be non-displayed characters, spaces, resized fonts, or purposeful misspellings scattered throughout the text. However, this would be detectable by an attacker or other third party because of the minor change in the document. To address this issue, it is necessary to change the document in such a manner that the change would not be visible to the eye, but could still be decoded using a computer. In this paper, an overview of existing research in this area is provided. First, we provide basic information about text steganography and its general procedure. Next, three classes of text steganography are explained: statistical and random generation, format-based methodologies, and linguistics. The techniques related to each class are analyzed, and particularly the manner in which a unique strategy is provided for hiding secret data. Furthermore, we review the existing works in the development of approaches and algorithms related to text steganography; this review is not exhaustive, and covers research published from 2016 to 2021. This paper aims to assist fellow researchers by compiling the current methods, challenges, and future directions in this field.
format article
author Mohammed Abdul Majeed
Rossilawati Sulaiman
Zarina Shukur
Mohammad Kamrul Hasan
author_facet Mohammed Abdul Majeed
Rossilawati Sulaiman
Zarina Shukur
Mohammad Kamrul Hasan
author_sort Mohammed Abdul Majeed
title A Review on Text Steganography Techniques
title_short A Review on Text Steganography Techniques
title_full A Review on Text Steganography Techniques
title_fullStr A Review on Text Steganography Techniques
title_full_unstemmed A Review on Text Steganography Techniques
title_sort review on text steganography techniques
publisher MDPI AG
publishDate 2021
url https://doaj.org/article/b8cb29df8ae44b2fb8aab4173ec498b3
work_keys_str_mv AT mohammedabdulmajeed areviewontextsteganographytechniques
AT rossilawatisulaiman areviewontextsteganographytechniques
AT zarinashukur areviewontextsteganographytechniques
AT mohammadkamrulhasan areviewontextsteganographytechniques
AT mohammedabdulmajeed reviewontextsteganographytechniques
AT rossilawatisulaiman reviewontextsteganographytechniques
AT zarinashukur reviewontextsteganographytechniques
AT mohammadkamrulhasan reviewontextsteganographytechniques
_version_ 1718431906438053888