An Efficient Text Hiding Algorithm Based on ASCII Codes
![]() |
International Journal of Recent Engineering Science (IJRES) | ![]() |
© 2025 by IJRES Journal | ||
Volume-12 Issue-3 |
||
Year of Publication : 2025 | ||
Authors : Musah Yahaya, Edem Kwedzo Bankas, Salamudeen Alhassan |
||
DOI : 10.14445/23497157/IJRES-V12I3P107 |
How to Cite?
Musah Yahaya, Edem Kwedzo Bankas, Salamudeen Alhassan, "An Efficient Text Hiding Algorithm Based on ASCII Codes," International Journal of Recent Engineering Science, vol. 12, no. 3, pp. 58-63, 2025. Crossref, https://doi.org/10.14445/23497157/IJRES-V12I3P107
Abstract
Steganography is a technique for concealing information within innocuous media to prevent detection. Unlike encryption, which secures content but reveals its presence, steganography obscures content and existence. This paper introduces a novel text-based steganographic technique using ASCII encoding and a dual-function approach for embedding and extraction. The proposed method utilizes a three-key embedding mechanism—initial position, stepping distance, and a constant—to generate a robust key space. Experimental evaluations demonstrate that the technique offers enhanced security, high embedding capacity, and improved performance in terms of time complexity and resource usage compared to existing approaches. These results indicate the method's suitability for secure and efficient covert communication.
Keywords
Steganography, Cryptography, ASCII, Embedding, Encryption, Decryption.
Reference
[1] Robert Lockwood, and Kevin Curran, “Text Based Steganography,” International Journal of Information Privacy, Security and Integrity, vol. 3, no. 2, pp. 134-153, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Indradip Banerjee, Souvik Bhattacharyya, and Goutam Sanyal, “An Approach of Quantum Steganography through Special SSCE Code,” International Journal of Computer and Information Engineering, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[3] William August Kotas, “A Brief History of Cryptography,” Chancellor’s Honors Program Projects, pp. 1-68, 2000.
[Google Scholar] [Publisher Link]
[4] Souvik Bhattacharyya, Indradip Banerjee, and Gautam Sanyal, “Design and Implementation of Secure Text Based Steganography Model,” Proceedings of the 2010 International Conference on Security & Management, 2010.
[Google Scholar]
[5] Prapti Sharma, and Shweta Goyal, “Steganography Techniques,” International Journal of Engineering Research & Technology, vol. 2, no. 4, pp. 2425-2428, 2013.
[Google Scholar] [Publisher Link]
[6] Naga Ranjith Kumar Kesa, “Steganography a Data Hiding Technique,” Culminating Projects in Information Assurance, pp. 1-91, 2018.
[Google Scholar] [Publisher Link]
[7] M. Agarwal, “Text Steganographic Approaches: A Comparison,” International Journal of Network Security & Its Applications, vol. 5, no.1, pp. 91-106, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[8] L.Y. Por, and B. Delina, “Information Hiding: A New Approach in Text Steganography,” 7th WSEAS International Conference on Applied Computer & Applied Computational Science, pp. 689-695, 2008.
[Google Scholar]
[9] Aruna Malik, Geeta Sikka, and Harsh K. Verma, “A High Capacity Text Steganography Scheme Based on Huffman Compression and Color Coding,” Journal of Information & Optimization Sciences, vol. 38, no. 5, pp. 647-664, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Fabien A.P. Petitcolas, and Stefan Katzenbeisser, “Information Hiding Techniques for Steganography and Digital Watermaking,” EDPACS, vol. 28, no. 6, pp. 1-2, 2000.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Riguang Lin, and Sheng Li, “An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm,” Security and Communication Networks, vol. 2021, no. 1, pp. 1-18, 2021.
[CrossRef] [Google Scholar] [Publisher Link]