Skip to main content
Top

2015 | OriginalPaper | Chapter

Dual Stage Text Steganography Using Unicode Homoglyphs

Authors : Sachin Hosmani, H. G. Rama Bhat, K. Chandrasekaran

Published in: Security in Computing and Communications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Text steganography is hiding text in text. A hidden text gets hidden in a cover text to produce a plain looking stego text. This plain looking stego text is posted as the message which no one suspects to contain anything concealed. Today, text messages are a common mode of communication over the internet and it is associated with a huge amount of traffic. Steganography is an added layer of protection that can be used for security and privacy. In this paper, we describe a text steganography approach that provides a good capacity and maintains a high difficulty of decryption. We make use of approaches of space manipulation, linguistic translation and Unicode homoglyphs in our algorithm. Our implementation is in Python. Also, we explain a parallel approach for hiding large hidden text messages in large cover text messages.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Kahn, D.: The Codebreakers. Macmillan, New York (1967) Kahn, D.: The Codebreakers. Macmillan, New York (1967)
3.
go back to reference Norman, B.: Secret Warfare. Acropolis Books, Washington, D.C. (1973) Norman, B.: Secret Warfare. Acropolis Books, Washington, D.C. (1973)
4.
go back to reference Zim, H.S.: Codes and Secret Writing. William Morrow, New York (1948) Zim, H.S.: Codes and Secret Writing. William Morrow, New York (1948)
5.
go back to reference J. Brassilet et al., Document Marking and Identification using Both Line and Word Shifting. In: Proceedings of Infocom 1995. IEEE CS Press, Los Alamitos (1995) J. Brassilet et al., Document Marking and Identification using Both Line and Word Shifting. In: Proceedings of Infocom 1995. IEEE CS Press, Los Alamitos (1995)
6.
go back to reference Shahreza, M.H.S., Shahreza, M.S.: A new synonym text steganography. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1524–1526 (2006) Shahreza, M.H.S., Shahreza, M.S.: A new synonym text steganography. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1524–1526 (2006)
7.
go back to reference Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–336 (1996)CrossRef Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–336 (1996)CrossRef
8.
go back to reference Roshanbin, N., Miller, J.: Finding homoglyphs - a step towards detecting unicode-based visual spoofing attacks. In: Bouguettaya, A., Hauswirth, M., Liu, L. (eds.) WISE 2011. LNCS, vol. 6997, pp. 1–14. Springer, Heidelberg (2011) CrossRef Roshanbin, N., Miller, J.: Finding homoglyphs - a step towards detecting unicode-based visual spoofing attacks. In: Bouguettaya, A., Hauswirth, M., Liu, L. (eds.) WISE 2011. LNCS, vol. 6997, pp. 1–14. Springer, Heidelberg (2011) CrossRef
9.
go back to reference Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 156–165. Springer, Heidelberg (2001)CrossRef Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 156–165. Springer, Heidelberg (2001)CrossRef
10.
go back to reference Chapman, M., Davida, G.: Hiding the hidden ciphertext in innocuous text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334. Springer, Heidelberg (1997) CrossRef Chapman, M., Davida, G.: Hiding the hidden ciphertext in innocuous text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334. Springer, Heidelberg (1997) CrossRef
Metadata
Title
Dual Stage Text Steganography Using Unicode Homoglyphs
Authors
Sachin Hosmani
H. G. Rama Bhat
K. Chandrasekaran
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-22915-7_26

Premium Partner