Conference PaperPDF Available

Fast Real Hardware Engine for Multipoint Text Steganography


Abstract and Figures

Different strategies were introduced in the literature to protect data. Some techniques change the data form while other techniques hide the data inside another file. Steganography techniques conceal information inside different digital media like image, audio, and text files. Most of the introduced techniques use software implementation to embed secret data inside the carrier file. Most software implementations are not sufficiently fast for real-time applications. In this paper, we present a new real-time Steganography technique to hide data inside a text file using a hardware engine with 11.27 Gbps hidden data rate. The fast Steganography implementation is presented in this paper.
Content may be subject to copyright.
978-1-4577-1343-9/12/$26.00 ©2014 IEEE
Fast Real-Time Hardware Engine for Multipoint Text Steganography
Ammar Odeh, Khaled Elleithy, and Miad Faezipour
Dept. of Computer Science and Engineering
University Of Bridgeport
Bridgeport, CT 06604, USA,,
Different strategies were introduced in the literature to
protect data. Some techniques change the data form
while other techniques hide the data inside another
file. Steganography techniques conceal information
inside different digital media like image, audio, and
text files. Most of the introduced techniques use
software implementation to embed secret data inside
the carrier file. Most software implementations are not
sufficiently fast for real-time applications. In this
paper, we present a new real-time Steganography
technique to hide data inside a text file using a
hardware engine with 11.27 Gbps hidden data rate.
The fast Steganography implementation is presented in
this paper.
I. I
A. Background
Different strategies are used to protect sensitive data
during transmission over unsecure channel. Some
algorithms suggest changing plain text into cipher text,
which is called cryptography. On the other hand, new
algorithms were presented to protect secret information
by hiding it which is called Steganography.
Steganography is a security mechanism which is used
to hide data inside a carrier file such as image, sound,
video, or text [1]. Secret information can be inserted
inside a carrier file using different strategies where
each one of them has its own advantages and
disadvantages. The first insertion technique is injection
where data is injected inside a carrier file, and this
increases the file size, and sometimes changes the file
format. The second approach is substitution where
sensitive information is replaced by other data from a
carrier file. In the substitution method, a search is
conducted for bits that have the lowest effect in the
carrier file to apply exchange operation on them. In
this technique, the main advantage is that the Stego
object size is the same as the carrier file. This feature
avoids an attacker’s suspicion. The main idea is to hide
the data inside the carrier file and then transmit the
Stego file using any communication channel.
Stegoanalysis starts by analyzing the data to find if
there is any suspicious feature about the carrier file.
Some file properties can be used by the analyzer to
discover the hidden data. The file size and file format
are examples of such properties. As shown in Figure 1,
Steganography is classified into four categories
depending on the type of the carrier file, i.e. image,
audio, video, or text. Moreover, Text Steganography
can be classified into different categories depending on
the file application.
Most of Steganography algorithms are applied on
images which contain large and redundant data. The
Least Significant Bit replacement algorithm (LSB) is
one such Steganography algorithm [2]. Other complex
algorithms have also been introduced to be applied on
images. However, the main problems are[3]:
1. File Size:- Image file sizes are relatively large
compared to other files.
2. Image Distortion: - The replacement of some
bits may destroy/distort the image, and this
empowers the Stegoanalysis method to
discover the hidden data [4].
3. Deterministic Changes: The same
deterministic algorithm produces the same
distribution bits over the image which results
the same hidden style. In other words, if we
try to replace white pixels by red ones, all
white pixels will be converted to red, and this
way, the original file could be easily
Audio carrier files also have some weak points as
any audio signal can be converted and processed in the
frequency domain. Computing the lower control limit
and upper control limit it will be possible to deduce if
there is any hidden data in that file. Video carrier files
combine the advantages and disadvantages of images
and audio carrier files. [5, 6].
Text files represent the smallest files in terms of size
that can be used to transfer data from the sender to the
receiver, when compared with the other carrier files
[7]. Moreover, the existence of huge amount of textual
data over the Internet enables us to hide data over
different websites and update those websites with a
new style of the hidden information that can be
embedded within the files. On the other hand, text files
represent the most difficult Steganography carrier files
since they do not have redundant patterns like audio or
image carrier files [3] .
B. Main Contributions and Paper Organization
A promising text steganography algorithm is
presented in this paper. The main approach is to use the
Multipoint steganography over Unicode text presented
in [8]. Arabic letters contain some multipoint letters
that can be employed to hide data by shifting the points
vertically and horizontally. The main advantage of this
algorithm is the number of bits that can be hidden in
each letter , where most of the presented algorithms in
literature can hide only one bit per letter [9]. In this
paper, we present an efficient hardware
implementation for the multipoint algorithm. In our
algorithm, we also suggest optimization techniques to
offer the highest degree of performance to achieve
“Magic Triangle Concepts” for Steganography; that is,
the function ability to achieve transparency,
robustness, and hiding capacity.
The rest of this paper is organized as follows. In
Section II we discuss previous text Steganography
techniques. The implementation of the Multipoint Text
Steganography is discussed in Section III. Discussion
and analysis of the implementation are also provided in
the same Section. Finally, concluding remarks are
offered in Section IV.
In [10], a novel hardware design was proposed for
image steganography using the least significant bit
(LSB) algorithm. The implementation was carried out
using Cyclone II FPGA of the ALTERA family. The
technique employed 2/3LSB design to produce a good
image quality to avoid any attacker doubt. Meanwhile,
it provided a high memory access performance to
speed up the system performance. In [11], an FPGA
hardware architecture was introduced to hide the secret
information by exploiting the noise regions in an
image. This strategy improved system transparency
which made it hard to realize the hidden data. In [12],
an implementation of audio or video Stenography
using FPGAs was discussed. The proposed algorithm
speeds up the secret data embedding rate at the
hardware implementation for real-time Steganography.
Another hardware architecture was introduced in [13]
to simulate the ability to hide information inside image
and video carrier files. Two schemes were applied to
speed up real-time video applications. The main
drawback of this system is its need for a high speed
memory buffer. In [14], the proposed algorithm
employed image as carrier file by using multilayer
embedding in parallel with three-stage pipeline on
FPGA. Promising results showed high throughputs
while maintaining the image quality. In [15] and [16],
authors employed perturbed quantization to hide data
inside JPEG image. The main feature of perturbed
quantization is that it is undetectable with current
As can be seen, most of the presented algorithms
that are implemented in hardware focus on image,
video, or audio as the carrier file for the secret
message. Meanwhile, text steganography has not been
considered for implementation in hardware engines
and/or digital signal processors.
In this paper, a novel hardware engine
implementation is presented over text as a carrier file.
The process is carried by the algorithm presented in [9]
to hide data in multipoint Arabic/Persian letters like (
ث, tha). In the Arabic language, there are five
multipoint letters, and in Persian there are eight. Each
character can be used to hide 2 bits to determine the
shifting and distance between letter points.
The Hiding Data Algorithm describes the scenario
at the hidden stage. Software implementation of this
technique would consist of two steps. The first stage is
the searching process and the second stage is
processing. Searching and processing are slow and
depend on the best and worst cases. Sequential search
applied in this algorithm has an average time O(N/2),
and this might increase the ability of the attackers to
capture a secret message. In the hardware
implementation, a high speed performance can be
achieved while increasing Steganography’s robustness
and transparency.
A. Hiding Data Algorithm
The algorithm used in this implementation is
presented in [8], where complete details are provided.
For the purpose of this discussion, we show here a
simple sketch of the algorithm.
Inputs: - Carrier file, hidden bits file
Output: - Stego file (updated multipoint letters)
Step1:- Choose any document
Step 2: Repeat while! (EOF)// repeat until the end of
the hidden file
Step3 check if Multipoint Letter then
Step 3a. Pack out the first two hidden bits
If hidden data ="00" then call Nochange ();
Else if hidden data= "01" then call distance ();
Else if hiddendata ="10" then call shifting ();
Else if hiddendata="11" then call
Step 4: Go to step 2
Step 5: Save file as PDF, then send it to receiver.
B. Hardware Implementation
For implementing this algorithm in hardware, a
state transition diagram must be constructed that
reflects the algorithm procedure. Figure 1 shows the
state diagram of the system. This system consists of
five states, where each state depends on the input value
(e.g. character in the text file) and the hidden data.
State A represents the initial state of the search. The
hidden information represents an input data to transfer
from one state to another.
Figure 2 represents the main components of the
hardware engine in RTL view. The system consists of
four comparison units to check the hidden information
in order to choose a suitable data path based on what
the hidden data bits are. Table I provides a list of the
used components representing the device utilization of
the FPGA for this hardware engine.
Furthermore, the system checks the input file data
too. It searches in the carrier file to insert remarks
depending on the hidden data. In other words, two sets
of inputs decide the next state transition in the state
In our implementation, we process the hidden file
two bits in each step to hide it and then a transition of
the current state to another state based on the
conditions. Figure 3 shows the signal analysis of data
inserted and the system states transformation using a
wave graph.
The state transitions occur based on the conditions
of the input data characters and the hidden data bits.
The critical path time reported by Quartus II
 1.42ns. We process 16 bits in each clock
cycle. Hence,
704.22 MHz .
Therefore, the system has an overall throughput of
11.27Gbits/second. This is while software simulations
would require O(n) time to process any file, and is
controlled by the file size and processor speed.
Components Name
Family Cyclone DE II
Met timing requirements Yes
Total Logic elements 12/10570 (<1%)
Total pins 20/336 (6%)
Total virtual pins 0
Device EP1S10F484C5
Timing Models Final
Table II provides a comparison between our
implementation and 5 other hardware implementations
reported in the literature.
Algorithm Strategy/Carrier file
[10] 2/3 Image Steganography
[11] Noisy region of image
[12] Audio, video
[13] Image, Video
[14] Multilayer and parallel
Proposed System Text file/ without change
file size
has 2
or more
ms 23.8 1245 105 2.11 15.4 968 126 1.37 10.3 535 104 9.14 13.8 516 75 1.22 21.8 499 46 1,93
All the presented hardware implementations
process audio, image or video files. To the best of our
knowledge, there is no hardware systems reported in
the literature for processing text. The multipoint
Algorithm hardware implementation represents one of
the unique text Steganography algorithms, as it
provides very high speed processing of real-time
applications while maintaining a minimum memory
buffer use.
In this paper, we presented a fast and real-time
hardware implementation for secure and safe
communications over networks. We have presented the
hardware implementation of the multipoint algorithm.
The proposed design represents one of the fastest Text
Steganography techniques in hardware. Previous
implementations provided efficient hardware
implementations over other carriers such as image,
video or audio files. This is the first hardware
implementation presented in literature for text
Steganography. In the future, we are planning to
present a parallel processing design to optimize the
system encryption speed and power consumption for
the multipoint algorithm as well as other text
Steganography algorithms.
[1] V. Potdar and E. Chang, "Visibly Invisible:
Ciphertext as a Steganographic Carrier," in
Proceedings of the 4th International Network
Conference (INC2004), 2004, pp. 385-391.
[2] T. Morkel, J. H. Eloff, and M. S. Olivier, "An
overview of image steganography," in ISSA,
2005, pp. 1-11.
[3] W. Bender, D. Gruhl, N. Morimoto, and A.
Lu, "Techniques for data hiding," IBM
systems journal, vol. 35, pp. 313-336, 1996.
[4] N. F. Johnson and S. Katzenbeisser, "A
survey of steganographic techniques," in
Information hiding, 2000, pp. 43-78.
[5] P. Jayaram, H. Ranganatha, and H. Anupama,
"Information Hiding Using Audio
Steganography–A Survey," The International
Journal of Multimedia & Its Applications
(IJMA) Vol, vol. 3, pp. 86-96, 2011.
[6] H. Singh, P. K. Singh, and K. Saroha, "A
Survey on Text Based Steganography," in the
3rd National Conference; INDIACom, 2009,
pp. 26-27.
[7] A. Z. Al-Othmani, A. A. Manaf, and A. M.
Zeki, "A Survey on Steganography
Techniques in Real Time Audio Signals and
Evaluation," International Journal of
Computer Science Issues(IJCSI), vol. 9, 2012.
[8] A. Odeh, A. Alzubi, Q. B. Hani, and K.
Elleithy, "Steganography by multipoint
Arabic letters," in Systems, Applications and
Technology Conference (LISAT), 2012 IEEE
Long Island, 2012, pp. 1-7.
[9] M. H. Shirali-Shahreza and M. Shirali-
Shahreza, "A new approach to Persian/Arabic
text steganography," in Computer and
Information Science, 2006 and 2006 1st
IEEE/ACIS International Workshop on
Component-Based Software Engineering,
Software Architecture and Reuse. ICIS-
COMSAR 2006. 5th IEEE/ACIS International
Conference on, 2006, pp. 310-315.
[10] B. J. Mohd, S. Abed, T. Al-Hayajneh, and S.
Alouneh, "FPGA hardware of the LSB
steganography method," in Computer,
Information and Telecommunication Systems
(CITS), 2012 International Conference on,
2012, pp. 1-4.
[11] E. Gómez-Hernández, C. Feregrino-Uribe,
and R. Cumplido, "FPGA hardware
architecture of the steganographic context
technique," in Electronics, Communications
and Computers, 2008. CONIELECOMP 2008,
18th International Conference on, 2008, pp.
[12] H. Farouk and M. Saeb, "Design and
implementation of a secret key steganographic
micro-architecture employing FPGA," in
Design, Automation and Test in Europe
Conference and Exhibition, 2004.
Proceedings, 2004, pp. 212-217.
[13] H. Leung, L. Cheng, L. Cheng, and C.-K.
Chan, "Hardware realization of
steganographic techniques," in Intelligent
Information Hiding and Multimedia Signal
Processing, 2007. IIHMSP 2007. Third
International Conference on, 2007, pp. 279-
[14] A. F. Mahmood and N. A. Kanai, "An FPGA
Implementation of Secured Steganography
Communication System," Tikrit Journal of
Engineering Science, vol. 19, pp. 14-23, 2012.
[15] G. Gul and A. E. Dirik, "Steganalytic features
for JPEG compression-based perturbed
quantization," Signal Processing Letters,
IEEE, vol. 14, pp. 205-208, 2007.
[16] J. Fridrich, M. Goljan, and D. Soukal,
"Perturbed quantization steganography,"
Multimedia Systems, vol. 11, pp. 98-107,
Figure 1. Finite State Machine Diagram.
Figure 2. RTL view of the hardware engine.
Figure 3. Timing Simulation of the hiding data algorithm and state transitions.
HI D[1.. 0]
11' h7FF - -
... This section discusses the complexity tradeoff by analysing average number of path calculation, average number of signal to noise ratio comparison and the soft handover overhead. [9][10][11][15][16][17][18][19][20][21][22]. ...
... So the average number of path calculation of the Block change is same as that of hook replacement with full generalized selection combining (GSC). [9][10][11][15][16][17][18][19][20][21][22]. ...
... Further, it has medium speed as well as larger number of cycles per bit as compared to simple spatial domain implementations as in [17], [18], and [19]. Table II shows the comparison between area usage, maximum frequency and cycles per secret bit between spatial domain implementation in [9], [17], [18], [19], [20] and transform domain implementation [16]. ...
... This approach gives improved efficiency and also allows us to do public key Steganography. The Steganography approach introduced by Odeh et al. [18] is a real-time hardware engine, where text is embedded. By taking care of a real-time application proposed work is faster to maintain security in communication over Internet. ...
Full-text available
Due to demand of information transfer through higher speed wireless communication network, it is time to think about security of important information to be transferred. Further, as these communication networks are part of open channel, to preserve the security of any Critical Information (CI) is really a challenging task in any real-time application. Data hiding techniques give more security and robustness of important CI against encryption or cryptographic software solutions. However, hardwired approach exhibits better solution not only in terms of reduction of complexity but also in terms of adaptive real-time output. This paper demonstrates frequency, Discrete Cosine Transform (DCT) domain Steganographic data hiding hardware solution for secret communication called Crypto-Stego-Real-Time (CSRT) System. The challenge is to design a secure algorithm keeping reliability of minimum distortion of original cover signal while embedding considerable amount of CI. Field Programmable Gate Array (FPGA) implementation shown in this paper is more secure, robust, and fast. Pipelining process while embedding enhances the speed of embedding, optimizes the memory utilization, and gives better Peak Signal to Noise Ratio (PSNR) and high robustness. Practically implemented hardware Steganographic solutions shown in this paper also give better performance than that of the current state-of-the-art hardware implementations.
... In [14], H.Y. Leung et al have designed and implemented a real time steganographic device that gives proper Selection of suitable technique for given cover media. Ammar Odeh have presented a faster (nearly 11.27 Gbits/seconds) implementation of steganography for text in their publication [15]. In [16], E. Gómez-Hernández have given a steganographic technique called 'ConText' technique. ...
Data protection has become a more critical issue and the necessity to secure a transmission channel is become more serious. Therefore, steganography, the art of hidden data into a digital media in a way that embed a secret message in the cover document without permitting anyone to suspect the data existence except the intended recipient, has become a relevant topic of research. The actual challenge in steganography is how it could obtain high robustness and capacity without damaging the cover document imperceptibility. This article presents two steganography approaches that based on the Similarity of English Font Styles (SEFS). This process has the main document font style replaced by a similar font style to embed the secret message after encoding it. This is done by using 1) the upper-case letters and punctuation marks of the carrier document or 2) the white space between words, start and end letters of each word that has more than 2 letters in the carrier document. These approaches are tested by being applied to various document formats with various font styles. From the findings, the secret message was vague to an antagonist and the stego-document size was increased and the capacity is very high. Also, the approaches are implemented using C# to develop a tool that hides a critical data in text document and the same findings were achieved.
Full-text available
Today’s large demand of internet applications requires data to be transmitted in a secure manner. Datatransmission in public communication system is not secure because of interception and impropermanipulation by eavesdropper. So the attractive solution for this problem is Steganography, which is the artand science of writing hidden messages in such a way that no one, apart from the sender and intendrecipient, suspects the existence of the message, a form of security through obscurity. Audio steganographyis the scheme of hiding the existence of secret information by concealing it into another medium such asaudio file. In this paper we mainly discuss different types of audio steganographic methods, advantages anddisadvantages.
Full-text available
In a modern era of Information Technology, illicit copying and illegal distribution accompany the adoption of widespread electronic distribution of copyrighted material. This is the main reason why people think about how to protect their work and how to prevent such unlawful activities. For this purpose various methods including cryptography, steganography, coding and so on have been used. Steganography is the best-suited technique that allow user to hide a message in another message (cover media). Most of steganography research uses cover media as pictures, video clips and sounds. However, text steganography is not normally preferred due to the difficulty in finding redundant bits in text document. To embed information inside a document its characteristics should be altered. These characteristics can be either the text format or characteristics of the character. But the problem is that if slight change has been done to the document then it will become visible to the third party or attacker. The key to this problem is that to alter the document in such a way that it is simply not visible to the human eye yet it is possible to decode it with computer. For this purpose various methods of text-based steganography have been purposed like line shifting, word shifting, feature coding, white space manipulation etc. In this paper, we present an overview of the steganography, with a particular focus on text-based steganography in details.
Full-text available
Steganography has proven to be one of the practical ways of securing data. It is a new kind of secret communication used mainly to hide secret data inside other innocent digital mediums. Most of existing steganographic techniques use digital multimedia files as cover mediums to hide secret data. Audio files and signals make appropriate mediums for steganography due to the high data transmission rate and the high level of redundancy. Hiding data in real time communication audio signals is not a simple mission. Steganography requirements as well as real time communication requirements are supposed to be met in order to construct a useful and useful data hiding application. In this paper we will survey the general principles of hiding secret information using audio technology, and provide an overview of current functions and techniques. These techniques will be evaluated across both, steganography and real time communication requirements.
Conference Paper
Full-text available
Conveying information secretly and establishing hidden relationship has been of interest since long past. Text documents have been widely used since very long time ago. Therefore, we have witnessed different method of hiding information in texts (text steganography) since past to the present. In this paper we introduce a new approach for steganography in Persian and Arabic texts. Considering the existence of too many points in Persian and Arabic phrases, in this approach, by vertical displacement of the points, we hide information in the texts. This approach can be categorized under feature coding methods. This method can be used for Persian/Arabic Watermarking. Our method has been implemented by JAVA programming language.
Conference Paper
Full-text available
Security methodologies are taken into consideration for many applications, where transferring sensitive data over network must be protected from any intermediate attacker. Privacy of data can be granted using encryption, by changing transmitted data into cipher form. Apart from encryption, hiding data represents another technique to transfer data without being noticeable by an attacker. This technique is called Steganography. In this paper, we will discuss the main concepts of Steganography and a carrier media that is used for this goal. Employing text as mask for other text represents the most difficult method that can be used to hide data. We will discuss some algorithms that use Arabic text. We then describe our doted space methodology to enhance data hiding.
Full-text available
The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised then this goal is defeated. The success of steganography, to a certain extent, depends on the secrecy of the cover medium. Once the steganographic carrier is disclosed then the security depends on the robustness of the algorithm used. Hence, to maintain secrecy either we have to make the cover medium more robust against steganalysis or discover new and better cover mediums. We consider the latter approach much more effective, since old techniques get prone to steganalysis. In this paper, we present one such cover medium. We propose to use ciphertext as a steganographic carrier. (114 words)
Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB) matching of Steganography embedding and extracting method.In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR) method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secures data transmission applications.
Conference Paper
Steganography is one of the most powerful techniques to conceal the existence of hidden secret data inside a cover object. Images are the most popular cover objects for steganography, and thus the importance of image steganography. Embedding secret information inside images requires intensive computations, and therefore, designing steganography in hardware speeds up steganography. This work presents a hardware design of Least Significant Bit (LSB) steganography technique in a cyclone II FPGA of the Altera family. The design utilizes the Nios embedded processor as well as specialized logic to perform the steganography steps. The design balances the tradeoffs such as imperceptibility, quality and capacity.