Analysis of Data Security Resilience in Text Steganography on Indonesian Language Structure
DOI:
https://doi.org/10.30865/ijics.v9i3.9487Keywords:
Data Protection, Text Steganography, Sentence Structure, Resistance to Attacks, Information SecurityAbstract
An in depth analysis of data security in text-based steganography is necessary to ensure the sustainability and security of the methodology used. The purpose of this study is to analyze the resilience of data security in text-based steganography. The analytical approach used involves identifying and assessing the vulnerabilities of text steganography methods using Indonesian sentence patterns. The initial stage of the research was to analyze previous works related to this field to understand previously identified vulnerabilities. The applied text embedding model is based on a dictionary consisting of 1,929 words grouped into seven word categories that correspond to sentence patterns in Indonesian, namely adj (adjective), adv (adverb), nom (noun), num (numeral), par (particle), pro (pronoun), and ver (verb). Each word class is arranged into a sentence structure and each has the same bit length, namely eight bits. The robustness analysis results show that single-word input data is still vulnerable to brute-force attacks or pattern analysis if the message embedding process uses a simple sentence structure. This is due to the relatively small search space, which makes it easier for attackers to guess the embedding pattern. Conversely, using sentence patterns consisting of more than two words significantly increases combinatorial complexity and expands the possibility space, making hacking attempts much more computationally difficult. Thus, the robustness of a steganographic system increases as the number of words in the sentence pattern increases, as the time and resources required to perform the attack become practically inefficient.
References
R. Gurunath, A. H. Alahmadi, D. Samanta, M. Z. Khan, and A. Alahmadi, “A Novel Approach for Linguistic Steganography Evaluation Based on Artificial Neural Networks,” IEEE Access, 2021, doi: 10.1109/ACCESS.2021.3108183.
M. A. Hameed, O. A. Abdel-Aleem, and M. Hassaballah, “A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques,” J. Ambient Intell. Humaniz. Comput., 2023, doi: 10.1007/s12652-022-04366-y.
H. Huanhuan, Z. Xin, Z. Weiming, and Y. Nenghai, “Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion,” 2017. doi: 10.1109/DSC.2017.16.
H. Kang, H. Wu, and X. Zhang, “Generative text steganography based on LSTM network and attention mechanism with keywords,” 2020. doi: 10.2352/ISSN.2470-1173.2020.4.MWSF-291.
L. Li, W. Zhang, C. Qin, K. Chen, W. Zhou, and N. Yu, “Adversarial batch image steganography against CNN-based pooled steganalysis,” Signal Processing, 2021, doi: 10.1016/j.sigpro.2020.107920.
S. Mukherjee, S. Mukhopadhyay, and S. Sarkar, “ChatGPT Based Image Steganography (CGIS): A Novel Intelligent Information Hiding Approach to Achieve Secure Covert Communication,” 2023. doi: 10.1109/ICAEECI58247.2023.10370937.
W. Peng, S. Li, Z. Qian, and X. Zhang, “Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism,” IEEE/ACM Trans. Audio Speech Lang. Process., 2023, doi: 10.1109/TASLP.2023.3319975.
W. Su, J. Ni, X. Hu, and J. Fridrich, “Image Steganography with Symmetric Embedding Using Gaussian Markov Random Field Model,” IEEE Trans. Circuits Syst. Video Technol., 2021, doi: 10.1109/TCSVT.2020.3001122.
Y. Tong, Y. L. Liu, J. Wang, and G. Xin, “Text steganography on RNN-Generated lyrics,” Math. Biosci. Eng., 2019, doi: 10.3934/mbe.2019271.
X. Wang, Y. Wang, K. Chen, J. Ding, W. Zhang, and N. Yu, “ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography,” 2023. doi: 10.1109/ICASSP49357.2023.10095722.
Z. L. Yang, S. Y. Zhang, Y. T. Hu, Z. W. Hu, and Y. F. Huang, “Vae-stega: Linguistic steganography based on variational auto-encoder,” IEEE Trans. Inf. Forensics Secur., 2021, doi: 10.1109/TIFS.2020.3023279.
S. Zhang, Z. Yang, J. Yang, and Y. Huang, “Provably Secure Generative Linguistic Steganography,” 2021. doi: 10.18653/v1/2021.findings-acl.268.
X. Zhou, W. Peng, B. Yang, J. Wen, Y. Xue, and P. Zhong, “Linguistic Steganography Based on Adaptive Probability Distribution,” IEEE Trans. Dependable Secur. Comput., 2022, doi: 10.1109/TDSC.2021.3079957.


