297
Views
11
CrossRef citations to date
0
Altmetric
Articles

Novel Text Steganography Using Natural Language Processing and Part-of-Speech Tagging

ORCID Icon & ORCID Icon
Pages 384-395 | Published online: 12 Jul 2018
 

Abstract

The practice of transmitting secret data by using cover data is called steganography. At present, several versatile steganographic methods are available using different digital objects (e.g. image, audio, video, text, etc.) as cover to hide data. Accordingly, many methods of steganalysis have been explored to reveal statistical anomalies in stego object, through which presence of secret data can be detected. However, applications of steganography and steganalysis techniques are challenging when cover object is text, as text does not have any redundant bits. In this paper, an innovative text steganography approach is proposed which uses natural language text as cover as well as secret message. The concept of shared key is also used here, that holds the count of each parts-of-speech of secret message. This key is RSA encrypted and shared with communicative parties. Stego created by this method also is in natural language text. This method is successful as the stego keeps the original meaning of the text in gross which makes it robust and undetectable. It shows good result in capacity ratio; also, the similarity index has been assessed by Jaro–Winkler distance and Generalized Levenshtein distance.

ORCID

Barnali Gupta Banik http://orcid.org/0000-0002-8107-9501 Samir Kumar Bandyopadhyay http://orcid.org/0000-0002-4868-3459http://orcid.org/0000-0002-4868-3459

Additional information

Notes on contributors

Barnali Gupta Banik

Barnali Gupta Banik, BTech (computer science & engineering), MTech (software engineering), PhD (pursuing in computer science and engineering from University of Calcutta, Kolkata, India), currently, Assistant Professor of Computer Science & Engineering Department at St. Thomas’ College of Engineering & Technology, Kolkata. She has over 9 years of teaching experience and over 2 years of industrial experience working for MNCs in India & UK. She has authored several research papers in Network Security domain, including 7 Scopus indexed and 1 SCIE indexed articles as of date. Corresponding author. Email: [email protected].

Samir Kumar Bandyopadhyay

Samir Kumar Bandyopadhyay, BE, MTech, PhD (computer science & engineering), C. Engg., D. Engg., FIE, FIETE, Sr. Member IEEE, currently, Professor of Computer Science & Engineering, University of Calcutta, Kolkata, India. He has around 30 years of teaching, research, and administrative experience and over 300 research papers publication in International & Indian Journals and authored 5 leading text books of Computer Science & Engineering. His research interests include bio-medical engineering, mobile computing, pattern recognition, software engineering, network security etc. Email: [email protected].

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 100.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.