Combining Invisible Unicode Characters To Hide Information In A Text Document

N.R. Zaynalov - Department of information security, Samarkand branch of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Samarkand, 140100, Uzbekistan
U.Kh. Narzullaev - Department of information security, Samarkand branch of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Samarkand, 140100, Uzbekistan
A.N. Muhamadiev - Department of information security, Samarkand branch of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Samarkand, 140100, Uzbekistan
I.R. Rahmatullaev - Department of information security, Samarkand branch of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Samarkand, 140100, Uzbekistan
R.K. Buranov - Department of information security, Samarkand branch of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Samarkand, 140100, Uzbekistan


Citation Format:



DOI: http://dx.doi.org/10.30630/joiv.4.3.406

Abstract


Steganography develops tools and methods for hiding the fact of message transmission. The first traces of steganographic methods are lost in ancient times. For example, there is a known method of hiding a written message: the slave's head was shaved, a message was written on the scalp, and after the hair grew back, the slave was sent to the addressee. From detective works, various methods of secret writing between the lines of ordinary text are well known: from milk to complex chemical reagents with subsequent processing. Digital steganography is based on hiding or embedding additional information in digital objects while causing some distortion of these objects. In this case, text, images, audio, video, network packets, and so on can be used as objects or containers. To embed a secret message, steganographic methods rely on redundant container information or properties that the human perception system cannot distinguish. Recently, there has been a lot of research in the field of hiding information in a text container, since many organizations widely use text documents. Based on this, here the MS Word document is considered as a medium of information. MS Word documents have different parameters, and by changing these parameters or properties, you can achieve data embedding. In the same article, we present steganography using invisible Unicode characters of the Space type, but with a different encoding.


Full Text:

PDF

References


Gutub, A. and M. Fattani. A novel arabic text steganography method using letter points and extensions. Proceedings of the WASET International Conference on Computer, Information and Systems Science and Engineering, May 25-27, 2007, Vienna, Austria, 2007. pp: 28-31.

Chen, B. and G.W. Womell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. 2001, IEEE Trans. Inform. Theory, 47: 2001. pp.1423-1443.

R. Bala Krishnan, Prasanth Kumar Thandra, M. Sai Baba. An overview of text steganography. 4th International Conference on Signal Processing, Communications and Networking (ICSCN -2017), March 16 - 18, 2017, Chennai, INDIA

Zaynalov N.R., Narzullaev U.Kh., Muhamadiev A.N., Bekmurodov U.B., Mavlonov O.N. Features of using Invisible Signs in the Word Environment for Hiding Data. 2019. International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue-9S3, July 2019. pp.1377-1379.

Liu, M., Y. Guo and L. Zhou. Text steganography based on online chat. Proceedings of the 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Sept. 1214, IEEE Xplore Press, Kyoto, 2009. pp: 807-810. DOI: 10.1109/IIH-MSP.2009.

Moraldo, H., An Approach for text steganography based on Markov Chains. Proceedings of the 4th Workshop de Seguridad Informatica, (WSI’ 12), 2012.pp: 26-39.

[Online].The Unicode Standard, URL: http://www.unicode.org, last visited: [Last accessed on 16.4.2020] .

Por LY, KosSheik Wong, and Kok Onn Chee, UniSpaChi a text-based data hiding method using unicode space characters. The Journal of Systems and Software.2012. pp. 1075-1082.

Por LY, Delina B. Information hiding—a new approach in text steganography. In: 7th WSEAS international conference on applied computer and applied computational science. Hangzhou China, 2008. pp 689-695.

Murphy, B., Syntactic information hiding in plaintext. Master’s Thesis. Trinity College Dublin. 2001.

P. Singh, R. Chaudhary, and A. Agarwal, “A Novel Approach of Text Steganography based on null spaces,” IOSR Journal of Computer Engineering, vol. 3, no. 4, 2012. pp. 11-17.

Xinmei, Meng, P., Ye, Y., Hang, L., Steganography in chinese text. In: 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), vol. 8, 2010. pp. V8-651-V8-654.https://doi.org/10.1109/ICCASM. 2010.5620373

Khairullah, M. Steganography in bengali unicode text. SUST J. Sci. Technol. 2018.

Hassan, M. and M. Shirali-Shahreza, Steganography in persian and arabic unicode texts using pseudospace and pseudo connection characters. J. Theoretical Applied Inform. Technol., 4: 2008. pp.682-687.

[Obeidat A.A.Arabic text steganography using Unicode of non-joined to right side letters. Journal of Computer Science.13(6), 2017. pp. 184-191.

Mohamed A.A. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach. Egyptian Informatics Journal. 15(2), 2014. pp. 79-87.

Por LY, Wong KokSheik, Chee Kok Onn. UniSpaCh: a text- based data hiding method using Unicode space characters. J Syst Softw 2012;85:1075-82.

Shahreza MS, Shahreza SS. Persian/Arabic Unicode text steganography. In: The fourth international conference on information assurance and security. IEEE; 2008. p. 62-66.

Shahreza MS, Shahreza MH. An improved version of Persian/ Arabic text steganography using ‘‘La” word. In: Proceedings of IEEE 6th national conference on telecommunication technologies; 2008. pp. 372-376..

A. Salman Saber, W. Akeel Awadh. Steganography in MS Excel Document Using Unicode System Characteristics. Journal of Basrah Researches ((Sciences)) Vol.( 39). No.( 1) .A 2013. pp.10-19.

Wesam Bhaya, Abdul Monem Rahma, Dhamyaa AL-Nasrawi. Text Steganography Based on Font Type in MS-Word Documents. Journal of Computer Science 9 (7): 2013.pp.898-904.

Rabah, K. Steganography-the art of hiding data. Inform// 2004, Technol. J., 3: 245-269.

Low, S.H.,N.F. Maxemchuk, J.T. Brassil and L. O'Gorman. Document marking and identification using both line and word shifting. Proceedings of the 14th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'95), April 2-6, 1995, IEEE Computer Society, Washington, DC. USA., pp: 853-860.

Bender, W., D. Gruhl, N. Morimoto and A. Lu. Techniques for data hiding// 1996, IBM Syst. J., 35: 313-336.

[Online]. : http://uza.uz/oz/culture/ayel-mu-addas-m-zhiza-yaratuvchi-15-04-2020. [Last accessed on 16.4.2020]




Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

__________________________________________________________________________
JOIV : International Journal on Informatics Visualization
ISSN 2549-9610  (print) | 2549-9904 (online)
Organized by Department of Information Technology - Politeknik Negeri Padang, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
Published by Department of Information Technology - Politeknik Negeri Padang
W : http://joiv.org
E : joiv@pnp.ac.id, hidra@pnp.ac.id, rahmat@pnp.ac.id

View JOIV Stats

Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.