Din2017 7
Din2017 7
1051/ shsconf/20173300036
i-COME'16
1 Introduction
With the rapid growth of Internet communication, information protection needs have
become a critical issue in order to secure information [1]. One of the advanced promising
researches on information protections for the next generation through untrusted
communication channels is a steganology field. Unlike cryptology, which utilizes the
encrypted and decrypted information of secret message which rendering the cover
messages completely meaningless, steganology keeps the cover messages perceptually
unchanged after concealing and detecting of the covered message. In speaking of
steganology, there are two main branches [2]. Steganography is concerned with avoiding
the suspicion of hidden messages in manipulated information [3]. Meanwhile, steganalysis
concerned is discovering and rendering covert messages in given information [4].
Steganography is usually mislabeled with cryptography, because both are aimed at
protecting valuable information. Whereas cryptography does not conceal the
communication but only scrambles the data to prevent eavesdroppers understanding the
content. Meanwhile steganography is study of hidden information [5] which is concealing
*
Corresponding author: [email protected]
© The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the
Creative Commons Attribution License 4.0 (http://creativecommons.org/licenses/by/4.0/).
SHS Web of Conferences 33 , 00036 (2017) DOI: 10.1051/ shsconf/20173300036
i-COME'16
the existing messages. There are two aspects of steganography, namely technical
steganography and text steganography. Technical steganography concentrates on channel
capacity which is concerned hiding information via a medium such as image, audio, video
or other digitally invisible code, while text steganography concentrates on using written
text to conceal secret messages [6].
2
SHS Web of Conferences 33 , 00036 (2017) DOI: 10.1051/ shsconf/20173300036
i-COME'16
This study consist of dataset such as cover text and hidden text that shown in Fig. 2.
Then, three techniques are considered as feature coding methods used as the stego keys
namely Changing Alphabet Letter Patterns called CALP [16], Vertical Straight Line called
VERT and Quadruple Categorization called QUAD [17].
(1)
(2)
where
a = Total bits of hidden text
b = Total bits of cover text
Meanwhile, embedded fitness ratio (ER) is used to determine the total fitness of a hidden
text can be embedded in a cover text. The ER of the stego keys can be calculated as;
(3)
(4)
where
a = Total number of embedded bits
b = Total bits of expected stego text
Finally, saving space ratio (SSR) is used to determine the total space of text that can be
saved during embedding process in a cover text that can be calculated as;
(5)
(6)
where
a = Total number of saving space bits
b = Total bits of expected stego text
3
SHS Web of Conferences 33 , 00036 (2017) DOI: 10.1051/ shsconf/20173300036
i-COME'16
20%
15%
10% CR%
Ratio
5%
ER%
0%
‐5% T1 T3 T5 T7 T9 T11 T13 T15 T17 T19 SSR%
‐10%
‐15%
Fig. 2 shows the number value of fitness performance for CALP. The result shows that the
CR has a stable increase from 2% until closely 15% throughout the analyzed text. As for
ER, the percentage ratio maintains between 14% and 13% throughout T1 to T9 and
suddenly declines from 13% to 5% between T9 and T10. The percentage remains
unchanged at 5% between T10 to T20. As for SSR, the percentage ratio starts at almost -
11% at T1. Increase is seen at T1 when the percentage moves from -6% to 1% at T10 and
gradually increases from 1% to 5% between T10 and T20.
20%
15%
10% CR%
Ratio
5%
ER%
0%
‐5% T1 T3 T5 T7 T9 T11 T13 T15 T17 T19 SSR%
‐10%
‐15%
4
SHS Web of Conferences 33 , 00036 (2017) DOI: 10.1051/ shsconf/20173300036
i-COME'16
20%
15%
10% CR%
Ratio
5%
ER%
0%
‐5% T1 T3 T5 T7 T9 T11 T13 T15 T17 T19 SSR%
‐10%
‐15%
6 Conclusions
This study evaluated the three methods in implementation of fitness measurements of the
stego keys based on capacity ratio, embedded fitness ratio, and saving space ratio. The
three categories of text steganography techniques have been evaluated. It has been
identified that CALP technique gives a better effort performance compared to VERT and
QUAD technique. However, VERT and QUAD techniques give a quite similar result for
embedding ratio and saving space performance compare to CALP. The results demonstrate
that all of the methods are able to perform consistently with the utilization of hidden text
and cover text. In future, this study proposes to evaluate a robustness of each technique in
order to find a strength capability on text steganography from steganalysis activities.
This work was supported by 2016 Non-PI University Grant under RIMC Grant, Universiti Utara
Malaysia (UUM).
References
1. J. M. Ahmed Z. M. Ali., IJCSNS 11, 4 (2011)
2. R. Chandramouli, N. D. Memon, Proceeding SPIE Security and Watermarking of
Multimedia Contents 5020,173 – 177 (2003)
3. C. Y. Chang, S. Clark, The 2010 Annual Conference of the North American Chapter of
the Association for Computational Linguistics, 591 – 599 (2010)
4. H. A. Aboalsamh, H. Mathkour, M. Mursi, G. M. Assassa, Proceedings of the 12th
WSEAS International Conference on Computers, 1011-1018 (2008)
5. R. Chandramouli, N. D. Memon, SPIE Security and Watermarking of Multimedia
Contents 5020,173 – 177 (2003)
6. M. Chapman, G. I. Davida, M. Rennhard, Proceedings of the Information Security
Conference (ISC '01), Malaga, Spain, 156 -165. (2001).
5
SHS Web of Conferences 33 , 00036 (2017) DOI: 10.1051/ shsconf/20173300036
i-COME'16