International Journal of Engineering Trends and Applications (IJETA) – Volume 5 Issue 4, Jul-Aug 2018
RESEARCH ARTICLE                                                                                   OPENACCESS
             Data Hiding Process with Indexes Based on Whitespace
                                    Method
                                           Thu Zar Win [1], Aye Wai Oo [2]
                                     Department Of Information Technology Engineering
                                           West Yangon Technological University
                                                         Myanmar
ABSTRACT
This research paper proposes to solve the insufficient cover text problem and used the enhancement of white space method for
hiding data, which is processed by changing the secret text through extracting the indexes of the characters from the cover text or
ASCII code, then converting these numbers from the decimal numeral system into the octal numeral system in order to use the
number 8 and 9 as indicators against the remaining numbers. Then, merge these outcomes with the white spaces between the words
in the cover text by changing the font size of these numbers to 1pt, and changing the font color to match background color of the
cover text. This system composed by three format-based methods such as inter-sentence spacing, end-of-line spacing and inter-word
spacing. This system used double encoding process using octal number.
Keywords:-- cover text , index , secret text , steganography and white space.
I. INTRODUCTION
          Information hiding is a general term encompassing          iii. Linguistic method : The affluence of electronic documented
many subdisciplines. One of the most important subdisciplines        information available in the world as well as the exertion of
is steganography. Steganography is derived from a finding by         serious linguistic analysis makes this an interesting medium for
Johannes Trithemus (1462-1516) entitled “Steganographia” and         steganography information hiding.
comes from the Greek words (στεγανός) meaning “covered
writing” [1, 2, 3]. Steganography is the art and science of hiding
a message inside another message without drawing any
suspicion to others so that the message can only be detected by
its intended recipient [4].The system presents three white space
methods; encoding a binary message into a text after each
terminating character, encoding data by inserting spaces at the
end of lines and by encoding data that involves justifying format
of text where the extra spaces are placed. Open space method is
one of the first used methods to hide data in white space
between words, lines and paragraph. This system is composed
by three formatted-based methods such as inter-sentence
spacing, end-osf-line spacing and inter-word spacing. The
advantage of this system is the sufficient of cover text.
                                                                                 Figure 1. Text Steganography Methods
 II. METHODS OF TEXT STEGANOGRAPHY
          There are three basic categories of text steganography      III. PROPOSED METHOD OF SYSTEM
(Fig. 1) maintained here: format-based methods, random &
statistical generation and linguistic methods.                         A.Open Space Method
                                                                               There are couple ways to employ the open space in
    i.    Format-based method : This method use the physical           text files to encode the information. This method works
             formatting of text as a space in which to hide            because to a casual reader one extra space at the end of line
             information. Format-based methods usually                 or an extra space between two words does not prompt
             modify existing text for hiding the steganographic        abnormality. However, open space methods are only useful
             text. Insertion of spaces or non-displayed                with ASCII format.
             characters, careful errors tinny throughout the text      • Inter-sentence space method encodes a “0” by adding a
             and resizing of fonts are some of the many format-        single space after a period in English prose. Adding two
             based methods used in text steganography.                 spaces would encode a “1”. This method works, but requires
                                                                       a large amount of data to hide only little information. Also
    ii.   Random and statistical generation method : This              many word processing tools automatically correct the spaces
             method avoid comparison with a known plaintext,           between sentences.
             steganographers often resort to generating their        • End-of-line space method exploits white space at the end of
             own cover texts. Character sequences method hide          each line. Data encoded using a predetermined number of
             the information within character sequences.
ISSN: 2393-9516                                             www.ijetajournal.org                                         Page 32
          International Journal of Engineering Trends and Applications (IJETA) – Volume 5 Issue 4, Jul-Aug 2018
 spaces at the end of each line. For example two spaces will                     Merge the indexs and ASCII code numbers
 encode one bit, four spaces will encode two bits and eight                          in the cover text
 spaces will encode three bits and so on. This technique                         Change font size and color for the numbers
 works better than the interspace method, because increasing        Step5: Repeat step 1 to 4 until complete covered the secret
 the number of spaces can hide more data.                           text
B.Challenging in Open Space Method
                                                                    IV. EXPERIMENTAL RESULTS OF SYSTEM
         To hide two words like “Top Secret” requires
text size cover of more than 80 words; because each
character size is 8 bit “1 byte” and each bit requires one
space.That means “T+o+p+ +S+e+c+r+e+t” equal 10
characters, 10 characters multiply by 8 bits equal 80 bits.To
be able to hide a large secret message; the result will be a very
large messageIn a properly justified format of text, not all
spaces are available to be used to hide the required data.
Data hiding techniques are obviously suffering some major
issues and in some certain cases may become inefficient.
C.Algorithm for embedding
Embedding algorithm
Input : Cover text in richtextfile(.rtf)                                           Fig2: Home screen of system
Output :Stego-text
Step1:Scan the cover text document to find white space
characters:
      Index of the secret text characters:
              Taking each character from the secret text.
              Looking for character in the cover text.
              Taking the index of the character from the
                   cover text.
              Compilation of the indexes taken from the
                   cover text in the array.
Step2:Insert ASCII code characters of the secret text
characters:
              If the character does not exist in the cover
                   text      or     exists     with     different
                   capitalization:get the character code from
                                                                     Fig3: We can synchronously count the number of characters,
                   the ASCII code characters as it’s listed in
                                                                                         words, and spaces
                   ASCII Table.
              Compile the indexes taken from the cover
                   text in the array.
Step3: Change Octal numeral system:
              Convert the ASCII code from decimal
                  numeral system into octal numeral system.
              Convert indexs of the cover text from
                  decimal numeral system into octal numeral
                  system.
              Add number “8” begin of the converted octal
                  number; this step to distinguish the number
                  is from ASCII code characters.
              Compile the indexes and the ASCII codes
                  for secret text characters in the same order in
                  the text by inserting the number “9” between
                  these numbers to separate the characters
                  indexes and ASCII codes from each other.
Step4:Hide the secret text
              Detect the number of digits
ISSN: 2393-9516                                             www.ijetajournal.org                                     Page 33
         International Journal of Engineering Trends and Applications (IJETA) – Volume 5 Issue 4, Jul-Aug 2018
 Fig4: Type your secret text in Rich TextBox and check your
                     secret character numbers
                                                                      Fig9: evaluation the speed of data hiding process
                                                               V. COMPARISON OF TEXT
                                                                  STEGANOGRAPHY AND DATA HIDING
                                                                  USING INDEXES
                                                                                         TABLE 1
         Fig5:Cover file and Stego file are identical
 Fig6: We can browse rtf cover file to use as the Cover text
                                                               VI. CONCLUSION
                                                                       The proposed system takes advantage of the unused white
                                                               space from the text “Cover Text” to hide the data “Secret Data”
                                                               on the cover text. Another risk associated with text data hiding
                                                               is the insufficient of covered text. Security has always been
                                                               important in electronic applications. The key advantage of stego
                                                               is the ability to communicate without anyone knowing the true
                                                               content of communication. Steganography techniques used to
                                                               hide secret messages in stegoobjects. The Steganography
                                                               methods applied to different media. In proposed system a text
                                                               is encrypted before being hidden in order to achieve a better
                                                               level of secrecy. So we proposed the idea for this paper with
                                                               data hiding using combination of three formatted based methods
                                                               such as inter sentence spacing, end-of-line spacing and inter-
                                                               word spacing with sufficient cover text.
              Fig7: export index of secret text
                                                               REFERENCES
                                                               [1] F. A. P. Petitcolas, R.J. Anderson, and M. G. Kuhn,
                                                                   “Information hiding- a survey,” In Proceedings of IEEE,
                                                                   vol.87, pp. 1062-1078, 1999.
        Fig8: Using end of line space when secret text more    [2] L. Y. Por, and B. Delina, “Information hiding- a new
                          than cover text                          approach in text steganography,” 7th WSEAS Int. Conf. on
                                                                   Applied Computer and Applied Computational Science,
                                                                   2008, pp. 689-695.
ISSN: 2393-9516                                          www.ijetajournal.org                                      Page 34
         International Journal of Engineering Trends and Applications (IJETA) – Volume 5 Issue 4, Jul-Aug 2018
[3] L. Y. Por, T. F. Ang, and B. Delina, “WhiteSteg- a new
    scheme in information hiding using text steganography,”
    WSEAS Transactions on Computers, vol.7, no.6, pp. 735-
    745, 2008.
[4] S. Changder, D. Ghosh, and N. C. Debnath, “Linguistic
    approach for text steganography through Indian text,” 2010
    2nd Int. Conf. on Computer Technology and Development,
    2010, pp. 318-322.
[5] R.J. Anderson, and F. A. P. Petitcolas, “On the limits of
    steganography,” IEEE Journal of Selected Areas in
    Communication, vol.16, pp. 474-481, 1998.
[6] K. Rabah, “Steganography-the art of hiding data,”
    Information Technology Journal, vol.3, pp.245-269, 2004.
[7] K. Benett, “Linguistic steganography- survey, analysis and
    robustness concerns for hiding information in text,” Purdue
    University, CERIAS Tech. Report 2004-13, 2004.
[8] Dr. Mohammed Al-Mualla and Prof. Hussain Al-Ahmad,
    “Information        Hiding:       Steganography         and
    Watermarking”.[Online].Available:http://www.emirates.org
    /ieee/information_hiding.pdf [Accessed: March 12, 2008].
[9] K. Benett, “Linguistic steganography- survey, analysis and
    robustness concerns for hiding information in text,” Purdue
    University, CERIAS Tech. Report 2004-13, 2004.
[10] M. S. Shahreza, and M. H. S. Shahreza, “Text
    steganography in SMS,” 2007 Int. Conf. on Convergence
    Information Technology, 2007, pp. 2260-2265.
[11] W. Bender, D. Gruhl, N. Morimoto, and A. Lu,
    “Techniques for data hiding,” IBM Systems Journal, vol.35,
    pp. 313-336, 1996.
[12] M. H. S. Shahreza, and M. S. Shahreza, ”A new approach
    to Persian/Arabic text steganography,” In Proceedings of
    5th IEEE/ACIS Int. Conf. on Computer and Information
    Science and 1stIEEE/ACIS Int. Workshop on Component-
    Based Software Engineering, Software Architectureand
    Reuse, 2006, pp. 310-315.
[13] Nosrati, Masoud.,RonakKarimidan Mehdi Hariri.2011. An
    Introduction to Steganography Methods. World Applied
    Programming, Vol 1, No 3, 191-195, Agustus 2011
[14] Saleh Saraireh. 2013. A Secure Data Communication
    System Using Cryptography and Steganography.
    International Journal of Computer Networks &
    Communications (IJCNC) Vol. 5 No. 3, May 2013.
ISSN: 2393-9516                                          www.ijetajournal.org                             Page 35