A Unique Method for Concealing Information

Main Article Content

Zaynalov N.R.
Safarov R.A.
Vafayev M.A.
Shakarov A.A.
Saidmurodov M.A.
Sharipova U.B.
Nishonova M.Q.

Abstract

The subject of steganography is the means and methods that ensure the concealment of the fact of message transmission. The historical roots of this discipline are very deep. With the development of technology, the methods have also changed. If previously invisible ink was used between the lines of ordinary text, then modern digital steganography consists of embedding data in digital objects with minimal distortion. This is possible due to the use of the redundancy of the container data or the peculiarities of human perception, which is unable to notice these changes. In light of the widespread use of text documents in organizational activities, methods of hiding data in a text container, in particular, in MS Word documents, are becoming especially relevant. Based on this, an MS Word document is considered as an information carrier here. MS Word documents have different parameters, by changing these parameters or properties, it is possible to achieve data embedding. In this article, we present steganography using invisible Unicode characters of the Space type, but with different encoding. /2

Article Details

Section

Articles

How to Cite

A Unique Method for Concealing Information. (2025). Innovative: International Multidisciplinary Journal of Applied Technology (2995-486X), 3(10), 133-143. https://doi.org/10.51699/rpw0m020

References

[1] Gutub, A. and M. Fattani. A novel arabic text steganography method using letter points and extensions. Proceedings of the WASET International Conference on Computer, Information and Systems Science and Engineering, May 25-27, 2007, Vienna, Austria, 2007. pp: 28-31.

[2] Chen, B. and G.W. Womell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. 2001, IEEE Trans. Inform. Theory, 47: 2001. pp.1423-1443.

[3] R. Bala Krishnan, Prasanth Kumar Thandra, M. Sai Baba. An overview of text steganography. 4th International Conference on Signal Processing, Communications and Networking (ICSCN -2017), March 16 - 18, 2017, Chennai, INDIA

[4] Zaynalov N.R., Narzullaev U.Kh., Muhamadiev A.N., Bekmurodov U.B., Mavlonov O.N. Features of using Invisible Signs in the Word Environment for Hiding Data. 2019. International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue-9S3, July 2019. pp.1377-1379.

[5] Liu, M., Y. Guo and L. Zhou. Text steganography based on online chat. Proceedings of the 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Sept. 12¬14, IEEE Xplore Press, Kyoto, 2009. pp: 807-810. DOI: 10.1109/IIH-MSP.2009.

[6] Moraldo, H., An Approach for text steganography based on Markov Chains. Proceedings of the 4th Workshop de Seguridad Informatica, (WSI’ 12), 2012.pp: 26-39.

[7] [Online].The Unicode Standard, URL: http://www.unicode.org, last visited: [Last accessed on 16.4.2020] .

[8] Por LY, KosSheik Wong, and Kok Onn Chee, UniSpaChi a text-based data hiding method using unicode space characters. The Journal of Systems and Software.2012. pp. 1075-1082.

[9] Por LY, Delina B. Information hiding—a new approach in text steganography. In: 7th WSEAS international conference on applied computer and applied computational science. Hangzhou China, 2008. pp 689-695.

[10] Murphy, B., Syntactic information hiding in plaintext. Master’s Thesis. Trinity College Dublin. 2001.

[11] P. Singh, R. Chaudhary, and A. Agarwal, “A Novel Approach of Text Steganography based on null spaces,” IOSR Journal of Computer Engineering, vol. 3, no. 4, 2012. pp. 11-17.

[12] Xinmei, Meng, P., Ye, Y., Hang, L., Steganography in chinese text. In: 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), vol. 8, 2010. pp. V8-651-V8-654.https://doi.org/10.1109/ICCASM. 2010.5620373

[13] Khairullah, M. Steganography in bengali unicode text. SUST J. Sci. Technol. 2018.

[14] Hassan, M. and M. Shirali-Shahreza, Steganography in persian and arabic unicode texts using pseudo¬space and pseudo connection characters. J. Theoretical Applied Inform. Technol., 4: 2008. pp.682-687.

[15] Obeidat A.A.Arabic text steganography using Unicode of non-joined to right side letters. Journal of Computer Science.13(6), 2017. pp. 184-191.

[16] Mohamed A.A. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach. Egyptian Informatics Journal. 15(2), 2014. pp. 79-87.

[17] Por LY, Wong KokSheik, Chee Kok Onn. UniSpaCh: a text- based data hiding method using Unicode space characters. J Syst Softw 2012;85:1075-82.

[18] Shahreza MS, Shahreza SS. Persian/Arabic Unicode text steganography. In: The fourth international conference on information assurance and security. IEEE; 2008. p. 62-66.

[19] Shahreza MS, Shahreza MH. An improved version of Persian/ Arabic text steganography using ‘‘La” word. In: Proceedings of IEEE 6th national conference on telecommunication technologies; 2008. pp. 372-376..

[20] A. Salman Saber, W. Akeel Awadh. Steganography in MS Excel Document Using Unicode System Characteristics. Journal of Basrah Researches ((Sciences)) Vol.( 39). No.( 1) .A 2013. pp.10-19.

[21] Wesam Bhaya, Abdul Monem Rahma, Dhamyaa AL-Nasrawi. Text Steganography Based on Font Type in MS-Word Documents. Journal of Computer Science 9 (7): 2013.pp.898-904.

[22] Rabah, K. Steganography-the art of hiding data. Inform// 2004, Technol. J., 3: 245-269.

[23] Low, S.H.,N.F. Maxemchuk, J.T. Brassil and L. O'Gorman. Document marking and identification using both line and word shifting. Proceedings of the 14th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'95), April 2-6, 1995, IEEE Computer Society, Washington, DC. USA., pp: 853-860.

[24] Bender, W., D. Gruhl, N. Morimoto and A. Lu. Techniques for data hiding// 1996, IBM Syst. J., 35: 313-336.

[25] [Online]. : http://uza.uz/oz/culture/ayel-mu-addas-m-zhiza-yaratuvchi-15-04-2020. [Last accessed on 16.4.2020]

Similar Articles

You may also start an advanced similarity search for this article.