International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 147

Research Paper | Computer Science & Engineering | Ethiopia | Volume 7 Issue 3, March 2018


A Comparison of Different Approaches in Text Steganography

Tewhasom Aregay Weldu


Abstract: The important of reducing a chance of the information being detected during the transmission is being an issue now days in the digital age, Steganography is the art and science of data hiding the existence of the communication by concealing a secret message inside another unsuspicious message. Steganography is often being used together with cryptography and offers an acceptable amount of privacy and security over the communication channel. This paper presents an overview of text and a brief history of steganography along with various existing text-based steganography techniques. Highlighting some of the problems inherent in text steganography as well as issues with existing solutions. The first approach hides a message in a wordlist where ASCII value of embedded character determines length and starting letter of a word. The second approach conceals a message, without degrading cover, by using start and end letter of words of the cover. The third approach is proposed in information hiding using inter-word spacing and inter-paragraph spacing as a hybrid method. Our method offers dynamic generated stego-text with six options of maximum capacity according to the length of the secret message. This paper also analyzed the significant drawbacks of each existing method and how our new approach could be recommended as a solution.


Keywords: Information hiding, steganography, text steganography


Edition: Volume 7 Issue 3, March 2018,


Pages: 179 - 182


How to Cite this Article?

Tewhasom Aregay Weldu, "A Comparison of Different Approaches in Text Steganography", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART2018487, Volume 7 Issue 3, March 2018, 179 - 182

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Information hiding'

Downloads: 108

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3119 - 3124

Steganography & Cryptography for Regimented Data Hiding System: A Review

Akash Sharma, Nikita Jain

Share this Article

Downloads: 108

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1548 - 1550

Joint Task Migration and Power Management in Wireless Computing

Dayanand G Savakar, Anand S Ghuli

Share this Article

Similar Articles with Keyword 'steganography'

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Similar Articles with Keyword 'text steganography'

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1720 - 1723

Text Steganography using Helping Verbs

Rahul Sanwal, Rishabh Jain

Share this Article

Downloads: 124

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 134 - 137

Sharing Approach for Securing Transaction based on VC & TS Framework

Vasanth SVL, G. Kishore

Share this Article

Similar Articles with Keyword 'Information'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 115 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Similar Articles with Keyword 'hiding'

Downloads: 91

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article
Top