Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32716
Secure Text Steganography for Microsoft Word Document

Authors: Khan Farhan Rafat, M. Junaid Hussain


Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.

Keywords: Hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1520


[1] Dretske, Fred. "Knowledge and the Flow of Information." (1981).
[2] Pfitzmann, B., “Information Hiding Terminology,” Proc. of First Internet Workshop on Information Hiding, Cambridge, UK, 1996, pp. 347-350.
[3] Rafat, K. F., “Digital Steganography For Ascii Text Document” Ph.D. dissertation, Dept. Comp. Science., International Islamic University, Islamabad, 2014.
[4] Petitcolas, F. A. P.; Anderson, R. J.; Kuhn, M. G.: Information hiding survey. In: Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, vol. 87, no. 5, pp. 1062–1078 (1999).
[5] Artz, Donovan. "Digital steganography: hiding data within data." IEEE Internet Computing 5, no. 3 (2001): 75-80.
[6] Djebbar, Fatiha, Beghdad Ayad, Karim Abed Meraim, and Habib Hamam. "Comparative study of digital audio steganography techniques." EURASIP Journal on Audio, Speech, and Music Processing 2012, no. 1 (2012): 1-16.
[7] McClaskey, Carolyn Marie. "Factors affecting relative pitch perception." (2016).
[8] Georgiev, Mihail, and Atanas Gotchev. "Method and Apparatus For Downscaling Depth Data For View Plus Depth Data Compression." U.S. Patent 20,160,094,829, issued March 31, 2016.
[9] Valentín, Kristián, Peter Wild, Svorad Štolc, Franz Daubner, and Markus Clabian. "Optical benchmarking of security document readers for automated border control." In SPIE Security+ Defence, pp. 999502-999502. International Society for Optics and Photonics, 2016.
[10] Gupta, Richa, and Priti Sehgal. "A survey of attacks on iris biometric systems." International Journal of Biometrics 8, no. 2 (2016): 145-178.
[11] Ivančević, Tajana Koren, Maja Rudolf, and Nikolina Stanić Loknar. "Steganography of vector graphics and typography in infrared security printing." Acta Graphica 27, no. 1 (2016).
[12] Petitcolas, Fabien AP, Ross J. Anderson, and Markus G. Kuhn. "Information hiding-a survey." Proceedings of the IEEE 87, no. 7 (1999): 1062-1078.
[13] Arnold, Michael, Martin Schmucker, and Stephen D. Wolthusen. Techniques and applications of digital watermarking and content protection. Artech House, 2002.
[14] Johnson, Neil F., Zoran Duric, Sushil Jajodia, and Nasir Memon. "Information hiding: steganography and watermarking—attacks and countermeasures." Journal of Electronic Imaging 10, no. 3 (2001): 825-826.
[15] Kahn, D. Codebreakers: The Story of Secret Writing. Revised ed., Scribner, New York, 1996.
[16] Wayner, Peter. Disappearing Cryptography: information hiding: steganography & watermarking. Morgan Kaufmann, 2009.
[17] Pfitzmann, B.: Information hiding terminology. In: Anderson, R. (ed.) Information Hiding, 1st International Workshop, vol. 1174 of Lecture Notes in Computer Science, pp. 347–350. Springer (1996).
[18] Dunbar, Bret. "A detailed look at Steganographic Techniques and their use in an Open-Systems Environment." Sans Institute 2002 (2002): 1-9.
[19] G. J. Simmons, “The prisoners’ problem and the subliminal channel.” in Advances in Cryptology: Proceedings of Crypto 83 (D. Chaum, ed.), Plenum Press, 1984, pp. 51–67.
[20] Dourish, Paul, Rebecca E. Grinter, Jessica Delgado De La Flor, and Melissa Joseph. "Security in the wild: user strategies for managing security as an everyday, practical problem." Personal and Ubiquitous Computing 8, no. 6 (2004): 391-401.
[21] J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, G. Wolf. “Modeling the security of steganographic systems.” Proc. 2nd Workshop on Information Hiding, April 1998, Portland, LNCS 1525, Springer-Verlag, 1998, pp. 345-355.
[22] Gregory Kipper. Investigator's Guide to Steganography. Auerbach Publications, October 2003, pp. 240.
[23] Johnson, Neil F., and Sushil Jajodia. "Exploring Steganography: Seeing the unseen." Computer 31, no. 2 (1998): 26-34.
[24] Ali Al-Ataby and Fawzi Al-Naima. “A Modified High Capacity Image Steganography Technique Based on Wavelet Transform.” The International Arab Journal of Information Technology, Vol. 7, No. 4, pp. 358-364, October 2010.
[25] Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett. “Steganography and digital watermarking.” Internet: (Last Accessed on September 5, 2016).
[26] Debnath, Bikash, Jadav Chandra Das, Debashis De, and Timam Ghosh. "Image masking using quantum-dot cellular automata." In Devices, Circuits and Systems (ICDCS), 2016 3rd International Conference on, pp. 231-235. IEEE, 2016.
[27] Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi. “A Survey on Image Steganography and Steganalysis.” Journal of Information Hiding and Multimedia Signal Processing,Vol. 2, April 2011, pp. 142-172.
[28] Provos, Niels, and Peter Honeyman. "Hide and seek: An introduction to steganography." IEEE Security & Privacy 1, no. 3 (2003): 32-44.
[29] A. Westfeld and A. Pfitzmann. “Attacks on steganographic systems,” in Proc. 3rd Int. Workshop on Information Hiding, 1999, vol. 1768, pp.61–76.
[30] J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O’Gorman, "Electronic Marking and Identification Techniques to Discourage Document Copying", IEEE Journal on Selected Areas in Communications, vol. 13, Issue. 8, October 1995, pp. 1495-1504.
[31] Bender, Walter, Daniel Gruhl, Norishige Morimoto, and Anthony Lu. "Techniques for data hiding." IBM systems journal 35, no. 3.4 (1996): 313-336.
[32] Por, L. Y., and B. Delina. "Information hiding: A new approach in text steganography." In WSEAS International Conference. Proceedings. Mathematics and Computers in Science and Engineering, edited by Qing Li, S. Y. Chen, and Anping Xu, no. 7. World Scientific and Engineering Academy and Society, 2008.
[33] Por, Lip Yee, KokSheik Wong, and Kok Onn Chee. "UniSpaCh: A text-based data hiding method using Unicode space characters." Journal of Systems and Software 85, no. 5 (2012): 1075-1082.
[34] Khairullah, M. D. "A novel text steganography system using font color of the invisible characters in Microsoft Word documents." In Computer and Electrical Engineering, 2009. ICCEE'09. Second International Conference on, vol. 1, pp. 482-484. IEEE, 2009.
[35] Stojanov, Ivan, Aleksandra Mileva, and Igor Stojanovic. "A New Property Coding in Text Steganography of Microsoft Word Documents." (2014): 25-30.
[36] Khadim, Umair, Aihab Khan, Basheer Ahmad, and Ahmed Khan. "Information Hiding in Text to Improve Performance for Word Document." International Journal of Technology and Research 3, no. 3 (2015): 50.
[37] Xiang, Lingyun, Caixia Sun, Niandong Liao, and Weizheng Wang. "A Characteristic-Preserving Steganographic Method Based on Revision Identifiers." International Journal of Multimedia and Ubiquitous Engineering 11, no. 9 (2016): 29-38.
[38] Liu, Tsung-Yuan, and Wen-Hsiang Tsai. "A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique." IEEE Transactions on Information Forensics and Security 2, no. 1 (2007): 24-30.
[39] Z. Fu, X. Sun, J. Zhang, and B. Li, “A novel watermark embedding and detection scheme based on zero- knowledge proof,” International Journal of Digital Content Technology and Its Applications, vol. 5, no. 3, pp. 273–286, 2011.
[40] M. Chapman, “NICETEXT,” 2014, Accessed on Nov.10, 2017.
[41] Spammimic, February 2014, Accessed on Nov.10,2017
[42] Petitcolas, Fabien AP. "Kerckhoffs’ principle." In Encyclopedia of cryptography and security, pp. 675-675. Springer US, 2011.