Main Article Content

Saad Nasser Al.Azzam Snazzam.199@gmail.com
Fahad Ali Al-Garni Snazzam.199@gmail.com


Abstract

Plain text is commonly utilized for online news and social media transmission due to its lightweight and cross-platform nature. Unfortunately, it may easily be exploited by attackers (For instance, in cases when the language is altered for specific goals, illegal access to the material or its abuse is possible.) To solve this problem, we embed secret texts (ST) within seemingly innocuous cover texts (CT) so that we can track CT for modifications. Based on the findings of this study, a method is provided for ST embedding in CT in which binary ST digits are converted to CT binary digits through Characters in ASCII (containing whitespace, punctuation, and special characters). Before commencing the embedding procedure, Using a One-Time Pad (OTP), the ST text was translated into ciphertext, and the value of each character was changed into a binary integer with a length of seven bits. As opposed to the ST text, which required additional time to encode, the CT text could be converted into a binary integer using just the first seven bits. During the embedding process, It was decided to swap the first bit of the ST character for the first bit of the CT character, which both had the same amount of bits (putting the first bit of the ST character, for example, on the same line as the first bit of the CT character). Any piece of ST that was recorded on any bit of CT served as a stage key. Extracting ST from CT requires the stage key. The embedded information served effectively as text steganography or watermark, and the CT's appearance was unaffected by the embedding procedure. In other words, the 1 character of ST might be concealed by using 7 CT characters. Also, a Jaro-Winkler Distance of 1 meant that the stage texts made couldn't be told apart from CT by looking at them.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
1.
Al.Azzam SN, Al-Garni FA. The use of binary digit mapping on ASCII characters to create a high-capacity, undetectable text steganography. j. adv. sci. eng. technol. [Internet]. 2023 Apr. 2 [cited 2024 Apr. 23];6(1):51-9. Available from: https://isnra.net/index.php/jaset/article/view/658
Section
Articles

References

A. Naharuddin, A. D. Wibawa and S. Sumpeno, "A High Capacity and Imperceptible Text Steganography Using Binary Digit Mapping on ASCII Characters," 2018 International Seminar on Intelligent Technology and Its Applications (ISITIA), Bali, Indonesia, 2018, pp. 287-292,

doi: 10.1109/ISITIA.2018.8711087

J. l.Azzam, S. N., & Al-Garni, F. A. (2023). The use of binary digit mapping on ASCII characters to create a high-capacity, undetectable text steganography. Journal of Advanced Sciences and Engineering Technologies, 5(2), 49–60. https://doi.org/10.32441/jaset.05.02.05

Naharuddin, A., Wibawa, A. D., & Sumpeno, S. (2018). A High Capacity and Imperceptible Text Steganography Using Binary Digit Mapping on ASCII Characters. 2018 International Seminar on Intelligent Technology and Its Applications (ISITIA). https://doi.org/10.1109/isitia.2018.8711087

P. Johri, A. Mishra, and S. Das, “Survey on steganography methods (text, image, audio, video, protocol and network steganography),” 2016 3rd Int. Conf. Comput. Sustain. Glob. Dev., pp. 2906–2909, 2016.

S. Sharma, A. Gupta, M. C. Trivedi, and V. K. Yadav, “Analysis of different text steganography techniques: A survey,” Proc. - 2016 2nd Int. Conf. Comput. Intell. Commun. Technol. CICT 2016, pp. 130–133, 2016.

Elshoush, H. T., Mahmoud, M. M., & Altigani, A. (2021). A new high capacity and secure image realization steganography based on ASCII code matching. Multimedia Tools and Applications, 81(4), 5191–5237. https://doi.org/10.1007/s11042-021-11741-y

Al Smadi, T. A. (2013). Design and Implementation of Double Base Integer Encoder of Term Metrical to Direct Binary Code Application. Journal of Signal and Information Processing, 4(4), 370-374.

Al Smadi, T. A., & Maitah, M. (2014). An efficiency and algorithm detection for stenography in digital symbols. International Journal of Computer Network and Information Security, 6(1), 34-38.

T. Acharjee, A. Konwar, R. K. Ram, R. Sharma, and D. Goswami, “XORSTEG: A New Model of Text Steganography,” 2016.

Ka. Kumar ProfSuresh Pabboju, “A Comparative Result Analysis of Text Based Steganographic Approaches,” IOSR J. Comput. Eng. Ver. VII, vol. 17, no. 3, pp. 2278–661, 2015.

A Coverless Text Steganography by Encoding the Chinese Characters’ Component Structures. (2021). International Journal of Digital Crime and Forensics, 13(6), 0–0. https://doi.org/10.4018/ijdcf.302135

Smadi, T. A., Al-Khawaldeh, I., & Smadi, K. A. (2017). Three-Dimensional Scenes Restore Using Digital Image. Journal of Signal and Information Processing, 08(01), 1–8. https://doi.org/10.4236/jsip.2017.81001

P. Christensson, “Plain Text Definition,” TechTerms., 2010. [Online]. Available: https://techterms.com/definition/plaintext. [Accessed: 14- May-2017].

Al-Smadi, T. A., & Al-Wahshat, H. (2011). System identification of the logical object and logical acupuncture. International Journal of Physical Sciences, 6(15), 3771-3777.

B. Leonardo and S. Hansun, “Text documents plagiarism detection using Rabin-Karp and Jaro-Winkler distance algorithms,” Indones. J. Electr. Eng. Comput. Sci., vol. 5, no. 2, pp. 462–471, 2017.

Al-Smadi, T. A., & Ibrahim, Y. K. (2007). Design of Speed Independent Ripple Carry Adder. Journal of Applied Sciences, 7(6), 848-854.

Ghaidan, K. A., Al Smadi, T. A., Aljumailly, T. A., & Al-Taweel, F. M. (2011). Development of a new approach for transmitting Digital message on a Frequency Limited Communication Channel transmission. Journal of Advanced Computer Science and Technology Research, 1, 52-62.

Naharuddin, Alfin, Adhi Dharma Wibawa, and Surya Sumpeno. "A high capacity and imperceptible text steganography using binary digit mapping on ASCII characters." 2018 International Seminar on Intelligent Technology and Its Applications (ISITIA). IEEE, 2018.

Elshoush, H. T., Mahmoud, M. M., & Altigani, A. (2022). A new high capacity and secure image realization steganography based on ASCII code matching. Multimedia Tools and Applications, 1-47.

Du, G. E. J. (2016). Ensuring the Security of Text-Based Information Transmission by Utilizing Invisible ASCII Characters. International Journal of Simulation: Systems, Science & Technology. https://doi.org/10.5013/ijssst.a.17.45.34

Vo, P.-H., Nguyen, T.-S., Huynh, V.-T., & Do, T.-N. (2020). A high-capacity invertible steganography method for stereo image. Digital Media Steganography, 99–122. https://doi.org/10.1016/b978-0-12-819438-6.00014-1

Vo, P.-H., Nguyen, T.-S., Huynh, V.-T., & Do, T.-N. (2020). A high-capacity invertible steganography method for stereo image. Digital Media Steganography, 99–122. https://doi.org/10.1016/b978-0-12-819438-6.00014-1

A. Al Smadi, T., & Maitah, M. (2013). An Efficiency and Algorithm Detection for Stenography in Digital Symbols. International Journal of Computer Network and Information Security, 6(1), 34–38. https://doi.org/10.5815/ijcnis.2014.01.05

Naharuddin, A., Wibawa, A. D., & Sumpeno, S. (2018, August). A high capacity and imperceptible text steganography using binary digit mapping on ASCII characters. In 2018 International Seminar on Intelligent Technology and Its Applications (ISITIA) (pp. 287-292). IEEE.

Bashir, H. M., Li, Q., & Hou, J. (2020, November). A high capacity text steganography utilizing unicode zero-width characters. In 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics) (pp. 668-675). IEEE.

AbuAlghanam O, Qatawneh M, Al Ofeishat HA, Adwan O, Huneiti A (2017) A new parallel matrix multiplication algorithm on tree-hypercube network using iman1 supercomputer. Int J Adv Comput Sci Appl 8(12):201–205

Hussein, A. L., Trad, E., & Al Smadi, T. (2018). Proactive algorithm dynamic mobile structure of Routing protocols of ad hoc networks. IJCSNS, 18(10), 86.