Academia.eduAcademia.edu

Outline

A Text Steganographic System Based on Word Length Entropy Rate

2017, International Journal of Recent Contributions from Engineering, Science & IT (iJES)

https://doi.org/10.3991/IJES.V5I3.7521

Abstract

The widespread adoption of electronic distribution of material is accompanied by illicit copying and distribution. This is why individuals, businesses and governments have come to think of how to protect their work, prevent such illicit activities and trace the distribution of a document. It is in this context that a lot of attention is being focused on steganography. Implementing steganography in text document is not an easy undertaking considering the fact that text document has very few places in which to embed hidden data. Any minute change introduced to text objects can easily be noticed thus attracting attention from possible hackers. This study investigates the possibility of embedding data in text document by employing the entropy rate of the constituent characters of words not less than four characters long. The scheme was used to embed bits in text according to the alphabetic structure of the words, the respective characters were compared with their neighbouring characters and if the first character was alphabetically lower than the succeeding character according to their ASCII codes, a zero bit was embedded otherwise 1 was embedded after the characters had been transposed. Before embedding, the secret message was encrypted with a secret key to add a layer of security to the secret message to be embedded, and then a pseudorandom number was generated from the word counts of the text which was used to paint the starting point of the embedding process. The embedding capacity of the scheme was relatively high compared with the space encoding and semantic method.

References (9)

  1. H. Singh, P. K. Singh, and K. Saroha, "A survey on text based steganography," in Proceedings of the 3rd National Conference, 2009, pp. 26-27.
  2. A. Al-Azawi and M. A. Fadhil, "Arabic text steganography using kashida extensions with huffman code. J," Applied Sci, vol. 10, pp. 436-439, 2010. https://doi.org/10.3923/jas.2 010.436.439
  3. "entropy of English," entropy of English -Everything2.com. .
  4. C. E. Shannon, "A mathematical theory of communication," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 5, no. 1, pp. 3-55, 2001. https://doi.org/10.1145/584091.584093
  5. C. E. Shannon, "Prediction and entropy of printed English," Bell Labs Technical Journal, vol. 30, no. 1, pp. 50-64, 1951. https://doi.org/10.1002/j.1538-7305.1951.tb01366.x
  6. G. Barnard, "Statistical Calculation of Worcl Entropies for Four Western Languages," IRE Transactions on Information Theory, no. 1, pp. 49-53, 1955. https://doi.org/10.1109/ TIT.1955.1055123
  7. J. Johansson, "The great debates: Pass phrases vs. passwords," Security Management Ocotber, 2004.
  8. "Generally accepted number of words per page," Google answers. Dec-2005.
  9. D. Zou and Y. Q. Shi, "Formatted text document data hiding robust to printing, copying and scanning," in Circuits and Systems, 2005. ISCAS 2005. IEEE International Symposium on, 2005, pp. 4971-4974.