Text steganography by changing the black color

Document Type : Original Article

Author

Department of Mathematics, Qom University of Technology, Qom, Iran

Abstract

Recently, a serious problem in communications is security. Hiding data is one of the most important security techniques. Steganography is the art and science of hiding information in a cover media. Texts are the most usual method of communication and so they are very suitable for cover objects. In this paper, we give a new technique for text steganography. There exist different models, such as RGB, HSL, HSV to determine a color. The main goal of the proposed algorithm is the fact that some different but very similar colors in RGB have the same code in HSL. We use this fact to hide data. For this purpose, first we find a color Bin RGB, which is very similar to black in such a way that they have the same code in HSL. Then, by changing the color of each character of the text to black or B, we conceal the information. We will show that the capacity of this method is better than some other methods of text steganography, and then we show that the invisibility of this algorithm is very high, which is the most prominent feature of the proposed technique.

Keywords

Main Subjects


[1] A. F. Al-Azzawi1, A multi-layer hybrid text steganography for secret communication using word tagging and rgb color coding, Int. J. Netw. Secur. Appl., 10 (2018), pp. 1–12.
[2] S. Al-Nofaie, M. Fattani, and A. Gutub, Merging two steganography techniques adjusted to improve Arabic text data security, J. Comput. Sci. Comput. Math. (JCSCM), 6 (2016), pp. 59–65.
[3] S. Al-Nofaie, A. Gutub, and M. Al-Ghamdi, Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces, J. King Saud Univ. Comput. Inf. Sci., 33 (2021), pp. 963–974.
[4] N. Alanazi, E. Khan, and A. Gutub, Inclusion of unicode standard seamless characters to expand arabic text steganography for secure individual uses, J. King Saud Univ. Comput. Inf. Sci., 34 (2022), pp. 1343–1356.
[5] R. A. Alotaibi and L. A. Elrefaei, Utilizing word space with pointed and un-pointed letters for Arabic text watermarking, in 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim), 2016, pp. 111–116.
[6] R. A. Alotaibi and L. A. Elrefaei, Improved capacity arabic text watermarking methods based on open word space, J. King Saud Univ. Comput. Inf. Sci., 30 (2018), pp. 236–248.
[7] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding, IBM Systems Journal, 35 (1996), pp. 313–336.
[8] S. G. R. Ekodeck and R. Ndoundam, PDF steganography based on Chinese Remainder Theorem, J. Inf. Secur. Appl., 29 (2016), pp. 1–15.
[9] A. Gutub and A. Al-Nazer, High capacity steganography tool for Arabic text using ’kashida’, ISC Int. J. Inf. Secur, 2 (2010), pp. 107–118.
[10] N. Ibraheem, M. Hasan, R. Z. Khan, and P. Mishra, Understanding color models: A review, 2 (2012), pp. 265–275.
[11] J. Karnel Sadie, L. Moyou Metcheka, and R. Ndoundam, Two high capacity text steganography schemes based on color coding, Revue Africaine de Recherche en Informatique et Math´ematiques Appliqu´ees, (2024).
[12] M. Khairullah, A novel text steganography system using font color of the invisible characters in Microsoft Word Documents, in 2009 Second International Conference on Computer and Electrical Engineering, vol. 1, 2009, pp. 482–484.
[13] A. Khan, Robust textual steganography, Journal of Science, 4 (2015), pp. 426–434.
[14] B. Khosravi and B. Khosravi, Text steganography based on text justifying methods, Adv. Defence Sci. & Technol., 12 (2021), pp. 159–167.
[15] B. Khosravi, B. Khosravi, B. Khosravi, and K. Nazarkardeh, A new method for pdf steganography in justified texts, Journal of Information Security and Applications, 45 (2019), pp. 61–70.
[16] R. Kumar, A. Malik, S. Singh, and S. Chand, A high capacity email based text steganography scheme using huffman compression, in 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 2016, pp. 53–56.
[17] I.-S. Lee and W.-H. Tsai, A new approach to covert communication via PDF files, Signal Processing, 90 (2010), pp. 557–565.
[18] L. Li, W. Zhang, K. Chen, and N. Yu, Steganographic security analysis from side channel steganalysis and its complementary attacks, IEEE Transactions on Multimedia, 22 (2020), pp. 2526–2536.
[19] L. Li, W. Zhang, K. Chen, H. Zha, and N. Yu, Side channel steganalysis: When behavior is considered in steganographer detection, Multimed. Tools Appl., 78 (2019), pp. 8041—-8055.
[20] T.-Y. Liu and W.-H. Tsai, A new steganographic method for data hiding in microsoft word documents by a change tracking technique, IEEE Transactions on Information Forensics and Security, 2 (2007), pp. 24–30.
[21] S. Mahato, D. A. Khan, and D. K. Yadav, A modified approach to data hiding in Microsoft Word documents by change-tracking technique, J. King Saud Univ. Comput. Inf. Sci., 32 (2020), pp. 216–224.
[22] G. Maji and S. Mandal, A forward email based high capacity text steganography technique using a randomized and indexed word dictionary, Multimed. Tools Appl., 79 (2020), pp. 26549–26569.
[23] A. Malik, G. Sikka, and H. K. Verma, A high capacity text steganography scheme based on lzw compression and color coding, Eng. Sci. Technol. Int J., 20 (2017), pp. 72–79.
[24] A. A. Obeidat, Arabic text steganography using unicode of non-joined to right side letters, Journal of Computer Science, 13 (2017), pp. 184–191.
[25] Online Applet, HSL to RGB/RGB to HSL/Hex Colour Converter. https://www.peko-step.com/en/tool/ hslrgb_en.html. Accessed: 2023.
[26] B. Osman, Message hiding technique in text steganography using RGB colour approach and random location, PhD thesis, Universiti Utara Malaysia, Changlun, Malaysia, 2020.
[27] L. Y. Por, K. Wong, and K. O. Chee, Unispach: A text-based data hiding method using unicode space characters, J. Syst. Softw., 85 (2012), pp. 1075–1082.
[28] N. Provos and P. Honeyman, Hide and seek: an introduction to steganography, IEEE Security & Privacy, 1 (2003), pp. 32–44.
[29] S. G. Rizzo, F. Bertini, and D. Montesi, Fine-grain watermarking for intellectual property protection, EURASIP J. Inf. Secur., 2019 (2019).
[30] M. Shirali-Shahreza and M. Shirali-Shahreza, A new approach to Persian/Arabic text steganography, in 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICISCOMSAR’06), 2006, pp. 310–315.
[31] M. Shirali-Shahreza and M. H. Shirali-Shahreza, Text steganography in SMS, in 2007 International Conference on Convergence Information Technology (ICCIT 2007), 2007, pp. 2260–2265.
[32] M. H. Shirali-Shahreza and M. Shirali-Shahreza, A new synonym text steganography, in 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008, pp. 1524–1526.
[33] M. Taleby Ahvanooey, Q. Li, J. Hou, H. Dana Mazraeh, and J. Zhang, AITSteg: An innovative text steganography technique for hidden transmission of text message via social media, IEEE Access, 2018 (2018), pp. 65981–65995.
[34] M. Taleby Ahvanooey, Q. Li, H. J. Shim, and Y. Huang, A comparative analysis of information hiding techniques for copyright protection of text documents, Secur. Commun. Networks, 2018 (2018).
[35] M. Taleby Ahvanooey, M. X. Zhu, W. Mazurczyk, Q. Li, M. Kilger, K.-K. R. Choo, and M. Conti, CovertSYS: A systematic covert communication approach for providing secure end-to-end con[1]versation via social networks, J. Inf. Secur. Appl., 71 (2022), 103368.
[36] R. Thabit, N. I. Udzir, S. M. Yasin, A. Asmawi, and A. A.-A. Gutub, CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data, IEEE Access, 10 (2022), pp. 65439–65458.
[37] D.-C. Wu and Y.-T. Hsu, Authentication of LINE chat history files by information hiding, ACM Trans. Multimedia Comput. Commun. Appl., 18 (2022), pp. 1–23.
[38] L. Xiang, W. Wu, X. Li, and C. Yang, A linguistic steganography based on word indexing compression and candidate selection, Multimed. Tools Appl., 77 (2018), pp. 28969–28989.
[39] C. Xiao, C. Zhang, and C. Zheng, Fontcode: Embedding information in text documents using glyph perturbation, ACM Trans. Graph., 37 (2018), pp. 1–16.
[40] W.-C. Yang and L.-H. Chen, A steganographic method via various animations in PowerPoint files, Multimed. Tools Appl., 74 (2015), pp. 1003–1019.
[41] M. Zamani, A. B. A. Manaf, R. B. Ahmad, F. Jaryani, H. Taherdoost, and A. M. Zeki, A secure audio steganography approach, in 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), London, U.K., 2009, pp. 1–6.
[42] S. Zhong, X. Cheng, and T. Chen, Data hiding in a kind of PDF texts for secret communication, Int. J. Netw. Secur., 4 (2007), pp. 17–26.