Volume 19, Issue 1 (5-2022)                   JSDP 2022, 19(1): 59-74 | Back to browse issues page

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Rezvani M, Fateh M. A High Capacity Email Steganography Scheme using Dictionary. JSDP. 2022; 19 (1) :59-74
URL: http://jsdp.rcisp.ac.ir/article-1-1047-en.html
Shahrood University of Technology
Abstract:   (405 Views)
The expansion of the use of information exchange space and public access to communication networks such as the Internet has led to the growing dependence of social institutions on the use of these networks. However, maintaining the security of information exchanged on networks is one of the most important challenges for users of these networks. One way to protect this data is to use private networks. But building these networks is not cost-effective in terms of time and cost. In contrast, the use of encryption techniques, access control mechanisms and data concealment are among the effective solutions for security in the information exchange space.
Existing methods for hiding information can be divided into three categories: cryptography, watermarking and steganography. In cryptography, a simple text is converted into encrypted text, which, of course, requires a decryption operation as well as an encryption key. In general, cryptographic techniques suffer from two major problems. The first problem is the ban on the transmission of encrypted data in dictatorial regimes, and the second problem is that cryptographers pay attention to encrypted data and stop any secret communication. The second category of information hiding methods is watermarking. Watermarking techniques are commonly used to protect the copyright of a digital content and to deal with issues such as fraud, fraud and copyright infringement in the data transfer space. In steganography methods, the transfer of information takes place in a cover through public communication channels, and only the sender and receiver are aware of the existence of a secret message. Two aspects of steganography must be observed. The first aspect is that the cover and secret content look the same in the face of statistical attacks. The second aspect is that the process of hiding the secret message in the cover is such that there is no difference between the cover and the secret in terms of the human perceptual system. In fact, the accuracy of the transmission media is maintained.
Steganography methods use image, video, protocol, audio, and text platforms to hide information. Steganography in the text is difficult due to very little local variation. Humans are very sensitive to textual changes. Hence it is difficult to spell in the text. However, due to the high use of text in digital media, the insensitivity of text to compression, the need for less memory to store and communicate more easily and faster, many methods for steganography have been introduced in it. In addition, text is still one of the major forms of communication available to the general public around the world.
In this paper, we propose a new email steganography scheme using a dictionary-based compression. In the proposed scheme, a number of email addresses containing a hidden message will be generated using the submitted text. The submitted text is sent to the generated and recipient addresses at the same time. This does not reveal the identity of the recipient of the message, and only the recipient can extract secret message using other email addresses. In the proposed method, two steganography keys are used. Using these two keys increases the security level of the proposed method. Also, the capacity of the proposed method is unlimited, which of course is a great advantage in a steganography method. This unlimited capacity provides high security for the proposed method. Another advantage is that the proposed method is not limited to the type of the cover-text. Initially, the secret message is converted to a bit string by a dictionary. Then the operation of embedding the secret message in the recipient's addresses is done by the steganography keys.
The efficiency of steganography algorithms depends on various factors such as lack of detection by the human eye, lack of detection by statistical methods, and capacity. The proposed method does not change the cover-text. Hence, this method is not detectable by humans or statistical methods. The capacity of the proposed method in this research is based on built-in email addresses. As the text of the message increases, the number of emails created increases too. Of course, this increase in the address of the emails created can lead to suspicion of the emails sent. Therefore, the parameter of the number of emails created is also important in the evaluation. In this paper, the efficiency of the proposed method is evaluated based on the two parameters and compared with existing methods. The results of this evaluation show that the proposed method, in addition to providing unlimited capacity in steganography, produces fewer email addresses generated as well as fewer message bits after compression.
Article number: 5
Full-Text [PDF 1156 kb]   (149 Downloads)    
Type of Study: Research | Subject: Paper
Received: 2019/07/15 | Accepted: 2020/02/3 | Published: 2022/06/22 | ePublished: 2022/06/22

References
1. [1] M. Taleby Ahvanooey, Q. Li, J. Hou, AR. Rajput, C. Yini, "Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis," Entropy, 2019 Apr; 21(4):355. [DOI:10.3390/e21040355] [PMID] [PMCID]
2. [2] M. Taleby Ahvanooey, Q. Li, HJ. Shim, Y. Huang, "A comparative analysis of information hiding techniques for copyright protection of text documents," Security and Communication Networks, 2018. [DOI:10.1155/2018/5325040]
3. [3] B. Gupta Banik, SK. Bandyopadhyay, "Novel Text Steganography Using Natural Language Processing and Part-of-Speech Tagging", IETE Journal of Research, vo. 13, pp. 1-2, 2018.
4. [4] NS. Kamaruddin, A. Kamsin, LY. Por, H. Rahman, "A Review of Text Watermarking: Theory, Methods, and Applications," IEEE Access, vol. 6:80, pp. 11-28, 2018. [DOI:10.1109/ACCESS.2018.2796585]
5. [5] M. Taleby Ahvanooey, H. Dana Mazraeh, SH. Tabasi, "An innovative technique for web text watermarking (AITW)," Information Security Journal: A Global Perspective, 1;25(4-6):191-6. 2016. [DOI:10.1080/19393555.2016.1202356]
6. [6] SG. Rizzo, F. Bertini, D. Montesi, C. Stomeo, "Text watermarking in social media," In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, 2017, vol. 31, pp. 208-211, ACM. [DOI:10.1145/3110025.3116203] [PMID] [PMCID]
7. [7] MS. Rahman, I. Khalil, X. Yi, "A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems," International Journal of Information Manage-ment, vol. 1, no. 45, pp. 276-88, 2019. [DOI:10.1016/j.ijinfomgt.2018.08.011]
8. [8] E. Satir and H. Isik, "A Huffman compression based text steganography method," Multimedia tools and applications, vol. 70, no. 3, pp. 2085-2110, 2014. [DOI:10.1007/s11042-012-1223-9]
9. [9] C.C. Chang, "A reversible data hiding scheme using complementary embedding strategy," Information Sciences, vol. 180, no. 16, pp. 3045-3058, 2010. [DOI:10.1016/j.ins.2010.03.027]
10. [10] E. Satirand H. Isik. "A compression-based text steganography method," Journal of Systems and Software, vol. 85, no. 10, pp. 2385-2394, 2012. [DOI:10.1016/j.jss.2012.05.027]
11. [11] S. Bhattacharyya, P. Indu, and G.Sanyal, "Hiding Data in Text using ASCII Mapping Technology (AMT)," International Journal of Computer Applications, vol. 70, no. 18, 2013. [DOI:10.5120/12169-8282]
12. [12] R. Kumar, A. Malik, S. Singh, B. Kumar, and S. Chand, "A space based reversible high capacity text steganography scheme using font type and style," In International Conference on Computing, Communication and Auto-mation (ICCCA), pp. 1090-1094, 2016. [DOI:10.1109/CCAA.2016.7813878] [PMCID]
13. [13] S.A. Al-Asadi and W.Bhaya, "Text Steganography in Excel Documents Using Color and Type of Fonts," Research Journal of Applied Sciences, vol. 11, no. 10, pp. 1054-1059, 2016.
14. [14] S. Roy and M.Manasmita, "A novel approach to format based text steganography," In Proceedings of the 2011 International Conference on Communication, Computing & Security, pp. 511-516, 2011. [DOI:10.1145/1947940.1948046] [PMID]
15. [15] B.K. Ramakrishnan, P.K.Thandra, and A.V. Srinivasula, "Text steganography: a novel character‐level embedding algorithm using font attribute," Security and Communication Networks, vol. 9, no. 18, pp. 6066-6079, 2016. [DOI:10.1002/sec.1757]
16. [16] A.M. Hamdan and A.Hamarsheh, "AH4S: an algorithm of text in text steganography using the structure of omega network," Security and Communication Networks, vol. 9, no. 18, pp.6004-6016, 2016. [DOI:10.1002/sec.1752]
17. [17] M. Shirali-Shahreza, "Text steganography by changing words spelling," In Advanced Communication Technology, 10th Inter-national Conference on, vol. 3, pp. 1912-1913, 2008. [DOI:10.1109/ICACT.2008.4494159]
18. [18] J. Gardiner, "StegChat: A Synonym-Substitution Based Algorithm for Text Steganography," PhD Thesis, School of Computer Science University of Birmingham, pp. 1-64, 2012.
19. [19] C.Y. Chang and S. Clark, "Linguistic steganography using automatically generated paraphrases," In Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, pp. 591-599, 2010.
20. [20] T.P. Nagarhalli, "A New Approach to SMS Text Steganography using Emoticons," In International Journal of Computer Appli-cations (0975-8887), National Conference on Role of Engineers in Nation Building (NCRENB-14), pp. 1-3, 2014.
21. [21] M. Garg, "A novel text steganography technique based on html documents," International Journal of Advanced Science and Technology, vol. 35, pp. 129-138, 2011.
22. [22] A. Majumder and S. Changder, "A novel approach for text steganography: Generating text summary using Reflection Symmetry," Procedia Technology, vol. 10, pp. 112-120, 2013. [DOI:10.1016/j.protcy.2013.12.343]
23. [23] L.Y. Por, K. Wong, and K.O. Chee, "UniSpaCh: A text-based data hiding method using Unicode space characters," Journal of Systems and Software, vol. 85, no. 5, pp. 1075-1082, 2012. [DOI:10.1016/j.jss.2011.12.023]
24. [24] R. Kumar, S. Chand, and S. Singh, "An Email based high capacity text steganography scheme using combinatorial compression," In Confluence The Next Generation Information Technology Summit (Confluence), 5th International Conference, pp. 336-339, 2014. [DOI:10.1109/CONFLUENCE.2014.6949231]
25. [25] A. Malik, G. Sikka, and H.K. Verma, "A high capacity text steganography scheme based on LZW compression and color coding," Engineering Science and Technology, an International Journal, vol. 20, no. 1, pp.72-79, 2016. [DOI:10.1016/j.jestch.2016.06.005]
26. [26] R. Kumar, A. Malik, S. Singh, and S. Chand, "A high capacity email based text steganography scheme using Huffman compression," In Signal Processing and Integrated Networks (SPIN), 3rd International Conference on Signal Processing and Integrated Networks (SPIN), pp. 53-56, 2016. [DOI:10.1109/SPIN.2016.7566661]
27. [27] T. Ahmad, M.S. Marbun, H. Studiawan, W. Wibisono, and R.M.Ijtihadie, "A Novel Random Email-Based Steganography," International Journal of e-Education, e-Business, e-Management and e-Learning, vol. 4, no. 2, pp. 129-134, 2014. [DOI:10.7763/IJEEEE.2014.V4.316]
28. [28] M. Fateh, M. Rezvani, "An email-based high capacity text steganography using repeating characters," International Journal of Computers and Applications, pp. 1-7, 2018. [DOI:10.1080/1206212X.2018.1517713]
29. [29] Chang CY, Clark S. "Practical linguistic steganography using contextual synonym substitution and a novel vertex coding method," Computational linguistics, vol, 40, no. 2, pp. 403-48, 2014 [DOI:10.1162/COLI_a_00176]

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2015 All Rights Reserved | Signal and Data Processing