Article Preview
TopIntroduction
Privacy is a major concern for users of public networks such as the Internet. Traditionally, privacy is among the central concerns of cryptography, which achieves private communication through encryption. One problem with encryption, however, is that although it may hide the contents of a message, the mere transmission of an encrypted message may cause suspicion.
As a motivating example, consider a scenario in which a government officer from some country is sent to work in another country for purposes of deepening international relationships between the two countries. Any electronic communication with the guest could easily be monitored by the host country's intelligence agency. If the guest is observed sending or receiving messages in encrypted form, he or she might be suspected of espionage. This could be illegal in some countries and could affect the relationship of mutual trust between the countries.
To avoid such suspicion, information hiding techniques collectively called steganography have received attention for a long time. Steganography dates at least as far back as ancient Greece (Ryder, 2004). In one story, a messenger had a message tattooed onto his shaved head, waited until his hair grew back, and then was sent to deliver the message. Since the secret message written on the messenger's head could not be read except by those who knew what to look for, his mission was successful. In modern times, steganography, which attempts to hide the existence of message transfer, has become a new major concern for the users of public communication networks.
The vast majority of practical steganographic schemes are instances of embedding steganography, in which a secret message is embedded in a given cover document to produce a normal-looking output. The secret message, cover document, and output are called the hiddentext, covertext, and stegotext, respectively. The covertext could be any kind of digital media, such as information in a Web site, Web board, blog, chat session, or email message. As such, steganographic schemes have been proposed for embedding secret messages in images (Lou & Liu, 2002), video (Su, Hartung, & Girod, 1998), audio (Cvejic & Seppänen, 2004), and text in multiple languages (Amano & Misaki, 1999; Brassil, Low, & Maxemchuk, 1999; Huang & Yan, 2001; Kim & Oh, 2004; Kim, Moon, & Oh, 2003; Muhammad, Rahman, & Shakil, 2009; Samphaiboon, in press; Shirali-Shahreza & Shirali-Shahreza, 2006; Shirali-Shahreza & Shirali-Shahreza, 2007; Sun, Luo, & Huang, 2004; Topkara, Taskiran, & Delp, 2005; Yuling, Xingming, Can, & Hong, 2007; Zhang, Zeng, Pu, & Zhu, 2006).
Among the existing practical steganographic schemes, images and video streams are the most popular covertext media, since they contain more redundancy than other types of covertext. However, in some situations, image and video steganography might not be effective, particularly when bandwidth is limited. Text documents are smaller in size than other types of covertext. Moreover, in the real world, people normally do their digital communications through text media such as email messages. Sending and receiving text messages has become normal daily behavior of humans everywhere. Therefore, text is an effective covertext medium for steganography.