IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v9y2021i21p2829-d674447.html
   My bibliography  Save this article

A Review on Text Steganography Techniques

Author

Listed:
  • Mohammed Abdul Majeed

    (Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia)

  • Rossilawati Sulaiman

    (Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia)

  • Zarina Shukur

    (Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia)

  • Mohammad Kamrul Hasan

    (Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia)

Abstract

There has been a persistent requirement for safeguarding documents and the data they contain, either in printed or electronic form. This is because the fabrication and faking of documents is prevalent globally, resulting in significant losses for individuals, societies, and industrial sectors, in addition to national security. Therefore, individuals are concerned about protecting their work and avoiding these unlawful actions. Different techniques, such as steganography, cryptography, and coding, have been deployed to protect valuable information. Steganography is an appropriate method, in which the user is able to conceal a message inside another message (cover media). Most of the research on steganography utilizes cover media, such as videos, images, and sounds. Notably, text steganography is usually not given priority because of the difficulties in identifying redundant bits in a text file. To embed information within a document, its attributes must be changed. These attributes may be non-displayed characters, spaces, resized fonts, or purposeful misspellings scattered throughout the text. However, this would be detectable by an attacker or other third party because of the minor change in the document. To address this issue, it is necessary to change the document in such a manner that the change would not be visible to the eye, but could still be decoded using a computer. In this paper, an overview of existing research in this area is provided. First, we provide basic information about text steganography and its general procedure. Next, three classes of text steganography are explained: statistical and random generation, format-based methodologies, and linguistics. The techniques related to each class are analyzed, and particularly the manner in which a unique strategy is provided for hiding secret data. Furthermore, we review the existing works in the development of approaches and algorithms related to text steganography; this review is not exhaustive, and covers research published from 2016 to 2021. This paper aims to assist fellow researchers by compiling the current methods, challenges, and future directions in this field.

Suggested Citation

  • Mohammed Abdul Majeed & Rossilawati Sulaiman & Zarina Shukur & Mohammad Kamrul Hasan, 2021. "A Review on Text Steganography Techniques," Mathematics, MDPI, vol. 9(21), pages 1-28, November.
  • Handle: RePEc:gam:jmathe:v:9:y:2021:i:21:p:2829-:d:674447
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/9/21/2829/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/9/21/2829/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Al-Daweri, Muataz Salam & Abdullah, Salwani & Ariffin, Khairul Akram Zainol, 2021. "A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem," International Journal of Critical Infrastructure Protection, Elsevier, vol. 34(C).
    2. Ning Wu & Zhongliang Yang & Yi Yang & Lian Li & Poli Shang & Weibo Ma & Zhenru Liu, 2020. "STBS-Stega: Coverless text steganography based on state transition-binary sequence," International Journal of Distributed Sensor Networks, , vol. 16(3), pages 15501477209, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Shuai Liu & Hui Qin & Guanjun Liu & Yang Xu & Xin Zhu & Xinliang Qi, 2023. "Runoff Forecasting of Machine Learning Model Based on Selective Ensemble," Water Resources Management: An International Journal, Published for the European Water Resources Association (EWRA), Springer;European Water Resources Association (EWRA), vol. 37(11), pages 4459-4473, September.
    2. Oyeniyi Akeem Alimi & Khmaies Ouahada & Adnan M. Abu-Mahfouz & Suvendi Rimer & Kuburat Oyeranti Adefemi Alimi, 2021. "A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification," Sustainability, MDPI, vol. 13(17), pages 1-19, August.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:9:y:2021:i:21:p:2829-:d:674447. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.