Skip to main content

A Semantic Approach to Text Steganography in Sanskrit Using Numerical Encoding

  • Conference paper
  • First Online:
Recent Findings in Intelligent Computing Techniques

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 707))

Abstract

Steganography is the art of hiding a message within another so that the presence of the hidden message is indiscernible. People who are not intended to be the recipients of the message should not even suspect that a hidden message exists. Text steganography is challenging as it is difficult to hide data in text without affecting the semantics. Retention of the semantics in the generated stego-text is crucial to minimize suspicion.This paper proposes a technique for text steganography using classical language Sanskrit. As Sanskrit is morphologically rich with a very large vocabulary, it is possible to modify the cover text without affecting the semantics. In addition numerical encoding is used to map a Sanskrit character to a numerical value. This helps in hiding the message effectively. Moreover, in this technique, a key is used for additional security. The key is generated dynamically and is appended to the final message to further add security to the proposed method. The proposed method generated stego-texts with syntactic correctness of 96.7%, semantic correctness of 86.6%, and with a suspicion factor of just 23.4% upon evaluation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wayner, P.: Mimic functions. Cryptologia XVI, 193–214 (1992)

    Article  MathSciNet  Google Scholar 

  2. Chapman, M.T.: Hiding the hidden: a software system for concealing ciphertext as innocuous text. In: Information and Communications Security Volume 1334 of the series Lecture Notes in Computer Science, pp. 335–345 (1997)

    Google Scholar 

  3. Meng, P., Huang, Chen, L.Z., Yang, W., Li, D.: Linguistic steganography detection based on perplexity. In: International Conference on MultiMedia and Information Technology, pp. 217–220 (2008)

    Google Scholar 

  4. Moerland, T.: Steganography and Steganalysis (2003)

    Google Scholar 

  5. Low, S.H., Maxemchuk, N.F., Brassil, J.T., O’gorman, L.: Document marking and identification using both line and word shifting. In: Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol. 2, pp. 853–860 (1995)

    Google Scholar 

  6. Bennett, K.: Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text. Purdue University, CERIAS Tech

    Google Scholar 

  7. Changder, S., Das, S., Ghosh, D.: Text steganography through Indian Languages using feature coding method. In: Eighth International Conference on Information Technology: New Generations (2011)

    Google Scholar 

  8. Kim, Y., Moon, K., Oh, L.: A text watermarking algorithm based on word classification and inter-word space statistics. In: Proceedings of the Seventh International Conference on Document Analysis and Recognition (LCDAR), pp. 775–779 (2003)

    Google Scholar 

  9. Huang, D., Van, H.: Interword distance changes represented by sine waves for watermarking text images. IEEE Trans. Circuits Syst. Video Technol. II(12), 1237–1245 (2001)

    Google Scholar 

  10. Pathak, M.: A new approach for text steganography using Hindi Numerical Code. Int. J. Comput. Appl. 1(8) (2010)

    Google Scholar 

  11. Changder, S., Debnath, N.C.: A new approach for steganography in Bengali text. In: Proceedings of the International Conference on Software Engineering and Data Engineering, pp. 74–78 (2009)

    Google Scholar 

  12. Changder, S., Ghosh, D., Debnath, N.C.: A Greedy approach to text steganography using properties of sentences. In: Eighth International Conference on Information Technology: New Generations (2011)

    Google Scholar 

  13. Vasu, S.C. (ed.): The Ashtadhyayi of Panini, vol. 2. Motilal Banarsidass Publishers (1962)

    Google Scholar 

  14. Gupta, R., Goyal, P., Diwakar, S.: Transliteration among Indian Languages using WX notation. In: Proceedings of KONVENS, Saarbrucken, Germany (2010)

    Google Scholar 

  15. Kulkarni, M., Dangarikar, C., Kulkarni, I., Nanda, A., Bhattacharyya, P.: Introducing Sanskrit Wordnet (2010)

    Google Scholar 

  16. Huet, G.: Formal structure of Sanskrit text: requirements analysis for a mechanical Sanskrit processor. In: Sanskrit Computational Linguistics 1 & 2. Springer, LNAI 5402 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Vaishakh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vaishakh, K., Pravalika, A., Abhishek, D.V., Meghana, N.P., Prasad, G. (2019). A Semantic Approach to Text Steganography in Sanskrit Using Numerical Encoding. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 707. Springer, Singapore. https://doi.org/10.1007/978-981-10-8639-7_19

Download citation

Publish with us

Policies and ethics