International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 7 | Year 2013 | Article Id. IJETT-V4I7P186 | DOI : https://doi.org/10.14445/22315381/IJETT-V4I7P186

Text Steganography Techniques: A Review


Neha Rani , Jyoti Chaudhary

Citation :

Neha Rani , Jyoti Chaudhary, "Text Steganography Techniques: A Review," International Journal of Engineering Trends and Technology (IJETT), vol. 4, no. 7, pp. 3213-3215, 2013. Crossref, https://doi.org/10.14445/22315381/IJETT-V4I7P186

Abstract

Steganography has been in use since the presence of secret messages and this use has gained popularity as the internet became well - liked. Text steganography is a sub part of steganography that hides the message behind other cover text file. Moreover, hiding the text behind HTML coding of web pages makes the detection of steganography impractical as web pages are a fundamental building blocks of the internet. This paper reviews some of most common text steganography techniques that mainly focus on protecting text behind HTML and CSS (Cascading Style sheets) coding of web pages. This paper also proposes a new technique based on hiding text behing HTML and CSS po rtion of web page coding.


Keywords

Steganography, Text, HTML, CSS.

References

[1] H.Kabetta, B.Y. Dwiandiyanta , Suyoto, “I nformation hiding in CSS: A secure scheme text - stegangraphy using public key Cryptosystem”,IJCIS,pp. 13 - 22 ,Vol.1, No.1,December 2011.
[2] Mohit Garg,” A Novel Text Steganography Technique Bas ed on Html Documents”, International Journal of Advanced Science and Technology,pp.132 - 138,Vol. 35, October, 2011.
[3] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding”, pp. 313 - 336, IBM Systems Journal, vol. 35, Issues 3&4, 1996.
[4] P.Singh, R.chaudhary and A.Agarwal,” A Novel Approach of Text Steganography based on null spaces”, IOSRJCE, PP 11 - 17 , Volume 3, Issue 4 (July - Aug. 2012).
[5] M.S. Shahreza,” A New Method for Steganography in HTML Files” , Computer, Information, and Systems Sciences, and Engineering, ProceedingsIETA 2005, TeNe 2005, EIAE 2005, 247 - 251, Springer.
[6] K. Bennett, " Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text ", Purdue Univ ersity, CERIAS Tech. Report 2004 - 13.

Time: 0.0013 sec Memory: 32 KB
Current: 1.88 MB
Peak: 4 MB