Review on Text Based Steganography

prateek dobriyal, joy yadav, jatin jain


With the rapid growth of networking mechanisms, where large amount of data can be transferred between users over different media, the necessity of secure systems to maintain data privacy increases significantly. Steganography is a significant means by which secret information is embedded into cover data imperceptibly for transmission, so that information cannot be easily aware by others.

In this paper we review different Text Based Steganography already in-use for hiding the data from the research done till now in this field to give a brief overview about it and provide analyse of different methods used today.

There is a lot of advantages using Text Steganography over other techniques as it is low in redundancy and related to different natural language rules which leads to limit manipulation of text, so they are both great challenges to conceal message in text properly and to detect such concealment.


Monika Agarwal,” TEXT STEGANOGRAPHIC APPROACHES: A COMPARISON,” International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1,2013

Mohit Garg, “A Novel Text Steganography Technique Based on Html Documents, ” International Journal of Advanced Science and Technology Vol. 35, October, 2011

Ei Nyein Chan Wai and May Aye Khine , “Syntactic Bank-based Linguistic Steganography Approach,” 2011 International Conference on Information Communication and Management IPCSIT vol.16 ,2011

Ammar Odeh1 , Khaled Elleithy and Miad Faezipour,”Text Steganography Using

Language Remarks,”

Tohari Ahmad, Melvin S. Z. Marbun, Hudan Studiawan, Waskitho Wibisono, and Royyana M. Ijtihadie, “A Novel Random Email-Based Steganography,” International Journal of e-Education, e-Business, e-Management and e-Learning, Vol. 4, No. 2, April 2014

Souvik Bhattacharyya , Indradip Banerjee and Gautam Sanyal, “A Novel Approach of Secure Text Based Steganography Model using Word Mapping Method(WMM), ” International Journal of Computer and Information Engineering 4:2 2010

Hitesh Singh and Kriti Saroha,” Reconstruction of Printed Document using Text Based Steganography”

Chandrakant Badgaiyan, Ashish Kumar Dewangan and Bhupesh Kumar Pandey ,

“ A SURVEY PAPER ON SMS BASED STEGANOGRAPHY,” International Journal of Advanced Computer and Mathematical Sciences ,ISSN 2230-9624. Vol 3, Issue 4, 2012, pp 441-445

Swati Gupta and Deepti Gupta, “Text -Steganography:

Review Study & Comparative Analysis,” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (5) , 2011, 2060-2062

Hitesh Singh, Pradeep Kumar Singh and Kriti Saroha , “A Survey On Text Based Steganography,” Proceedings of the 3rd National Conference;INDIACom-2009 Computing for Nation Development , February 26 – 27,2009

L. Y. POR and B. Delina ,” Information Hiding: A New Approach in Text Steganography,” 7th WSEAS Int. Conf. on APPLIED COMPUTER & APPLIED COMPUTATIONAL SCIENCE (ACACOS '08), Hangzhou, China, April 6-8, 2008

K B Shiva Kumar 1, K B Raja2, R K Chhotaray3, Sabyasachi Pattnaik4,” Performance Comparison of Robust Steganography Based on Multiple Transformation Techniques,” K B Shiva Kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (4), 1035-1047

پاراگلایدر Full Text: PDF


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN : 2251-1563