Conference PaperPDF Available

Fast Real-Time Hardware Engine for ZWC Text Steganography

Authors:

Abstract and Figures

Different strategies were introduced in the literature to protect data. Some techniques change the data form while other techniques hide the data inside another file. Steganography techniques conceal information inside different digital media like image, audio, and text files. Most of the introduced techniques use software implementation to embed secret data inside the carrier file. This is while software implementations are not sufficiently fast for real-time applications. In this paper, we present a new real-time zero-width-character (ZWC) Steganography technique to hide data inside a text file using a hardware engine with 6.415Gbps hidden data rate. The fast Steganography implementation is presented in this paper.
No caption available
… 
No caption available
… 
Content may be subject to copyright.
Fast Real-Time Hardware Engine for ZWC Text
Steganography
Ammar Odeh, Khaled Elleithy, and Miad Faezipour
Dept. of Computer Science and Engineering
University Of Bridgeport
Bridgeport, CT 06604, USA
aodeh@bridgeport.edu, elleithy@bridgeport.edu, mfaezipo@bridgeport.edu
AbstractDifferent strategies were introduced in the
literature to protect data. Some techniques change the
data form while other techniques hide the data inside
another file. Steganography techniques conceal
information inside different digital media like image,
audio, and text files. Most of the introduced techniques
use software implementation to embed secret data inside
the carrier file. This is while software implementations are
not sufficiently fast for real-time applications. In this
paper, we present a new real-time zero-width-character
(ZWC) Steganography technique to hide data inside a text
file using a hardware engine with 6.415Gbps hidden data
rate. The fast Steganography implementation is presented
in this paper.
KeywordsSteganography; Steganayalsis; Hardware
Engine, Zero-width-character
I. INTRODUCTION
Different strategies have been used to protect
sensitive data during transmission over unsecure
channels. Some algorithms suggested changing plain
text into cipher text, which is called cryptography. On
the other hand, some algorithms are presented to protect
secret information by hiding its existence.
Steganography is a security mechanism used to hide
data inside a carrier file such as image, sound, video, or
text [1]. Secret information can be inserted inside the
carrier file using different strategies, where each one of
them has advantages and drawbacks. The first insertion
technique is the case where data is injected inside a
carrier file. This increases the file size and sometimes
changes the file format. The second suggested
technique is substitution, where sensitive information is
replaced by other information from the carrier file. The
substitution method searches for bits that have the
lowest effect in the carrier file to apply the exchange
operation on them. The main advantage of this
technique is that the Stego object is the same size as the
carrier file, and this avoids any attacker suspicions. The
main idea is to hide data inside the carrier file and then
place the Stego file in some transport media. Stego-
analyst will start analyzing the data if there is any
suspicion about the carrier file. Some file properties
will be basic rules for the analyzer to discover the
hidden data. The file size and file format are examples
of such properties.
Most of Steganography algorithms are applied on
images which contain huge amount of redundant data.
The Least Significant Bit replacement algorithm (LSB)
is one such Steganography algorithm [2]. Other
complex algorithms are introduced to be applied on
images. However, the main problems that are faced in
image steganography are [3]:
I. File Size: - Image file sizes are already
relatively large compared to other files.
II. Image Distortion: - The replacement of some
bits may destroy/distort the image, and this
will enable the Stego-analyst to acquire the
hidden data [4].
III. Deterministic Changes: The same
deterministic algorithm will produce the same
distribution bits over the image and this will
produce the same hidden image area style. In
other words, if we try to replace white pixels
by red ones, all white pixels will be converted
to red, and this way, the original file could be
easily extracted.
Audio carrier files also have some weak points, since
any audio signal can be converted and processed in
frequency domain and by computing the lower control
limit and upper control limit, we can deduce if there are
any hidden data in that file. Video carrier files have the
disadvantages of merging the weaknesses in sound and
image files [5, 6].
Text files represent the smallest files in terms of size
that can be used to transfer data from sender to receiver,
when compared with the other carrier files [7].
Moreover, huge amount of textual data over the internet
enables us to hide data over different websites and
update those websites with a new style of hidden
information that can be embedded within the files. On
other hand, text files represent the most difficult
Steganography carrier files that do not have redundant
patterns like other carrier files [3] .
In this paper, we build on top of our prior work and
apply our ZWC [8] algorithm over hardware concepts
to speed up the system efficiency. In our algorithm,
we also suggest optimization techniques to offer the
highest performance to achieve “Magic Triangle
Concepts” for Steganography; that is, the function
ability to achieve transparency, robustness, and hiding
capacity.
The rest of this paper is organized as follows. In
Section II, we discuss previous text Steganography
techniques. Our proposed ZWC hardware engine is
discussed in Section III. Discussion and analysis of our
algorithm are also provided in the same Section.
Simulation results are provided in Section IV. Finally,
concluding remarks are offered in Section V.
II. PRIOR WORK
In [9], a novel hardware design was proposed for
image steganography using the least significant bit
(LSB) algorithm. The implementation was carried out
using Cyclone II FPGA of the ALTERA family. The
technique employed 2/3LSB design to produce a good
image quality to avoid any attacker doubt. Meanwhile,
it provided a high memory access performance to speed
up the system performance. In [10], an FPGA hardware
architecture was introduced to hide the secret
information by exploiting the noise regions in an image.
This strategy improved system transparency which
made it hard to realize the hidden data. In [11], an
implementation of audio or video Stenography using
FPGAs was discussed. The proposed algorithm speeds
up the secret data embedding rate at the hardware
implementation for real-time Steganography. Another
hardware architecture was introduced in [12] to
simulate the ability to hide information inside image
and video carrier files. Two schemes were applied to
speed up real-time video applications. The main
drawback of this system is its need for a high speed
memory buffer. In [13], the proposed algorithm
employed image as carrier file by using multilayer
embedding in parallel with three-stage pipeline on
FPGA. Promising results showed high throughputs
while maintaining the image quality. In [14] and [15],
authors employed perturbed quantization to hide data
inside JPEG image. The main feature of perturbed
quantization is that it is undetectable with current
Stego-analyst.
As can be seen, most of the presented algorithms
were implemented in hardware focus on image, video,
or audio as the carrier file for the secret message. This
is while text steganography has not been considered for
implementation in hardware engines and/or digital
signal processors.
III. PROPOSED MODEL
In this paper, a novel hardware engine
implementation is presented over text as a carrier file.
The process is based on this underlying concept that we
try to hide data inside a word file without any change in
the file format. Stego-analyst will try to analyze the file
containing the formatting. If there is any change in the
file format, the hidden data can be caught. In this work,
we will use the Zero Width Character (ZWC);Ctrl+
Shift +I; algorithm. The Unicode character for ZWC is
U+200B, which does not occupy any space or change
the file formatting. By adding ZWC before and after the
space character, we can hide data.
In Microsoft Word, it’s a possible to count the
number of characters in any file without counting space
characters. Therefore, after adding ZWC, the number of
letters will not be increased. The proposed algorithm
counts the number of spaces between words to evaluate
which file can hold more secret data.
The Hiding Data Algorithm describes the scenario at
the hidden stage. Software implementation of this
technique would consist of two steps. The first stage is
the searching process and the second stage is
processing. By hiding data in the file, the time
complexity will be   ,where M is the number
of carrier files, and N is the number of bits we want to
embed inside the file. The best case is  . In the
hardware implementation, however, a high speed
performance can be achieved while increasing
Steganography’s robustness and transparency.
A. Hiding Data Algorithm
The main algorithm used in this hardware engine
implementation is presented in [8], where complete
details are provided. For the purpose of this discussion,
we show here a simple sketch of the algorithm.
Algorithm I: Hidden Data
Input:-File: Hidden bits file
Output: - Stego file (embedded ZWC inside file)
Step1:- Choose any text file
Step2: Measure space ratio in selected test file, if
successful, continue, otherwise go back to Step1
Step 3. Repeat while! (EOF)
Step4: Embed hidden data inside selected file by:
Step 4a. Select space
Step 4b. Pack out first two hidden bits
If 00, then, no ZWC before space
Else if 01, then there is no ZWC after
space
Else if 10, then there is ZWC before space
Else, there is ZWC after space character.
Step 5: Go to Step 3
Step 6: Save file and send it.
For implementing this algorithm in hardware, a state
transition diagram must be constructed that reflects the
algorithm procedure. Figure 2 shows the state diagram
of the system. This system consists of five states, where
each state depends on the input value (e.g. character in
the text file) and the hidden data. State A represents the
initial state of the search. The hidden information
represents an input data to transfer from one state to
another
Figure 3 represents the main components of the
hardware engine in RTL view. The system consists of
four comparison units to check the hidden information
in order to choose a suitable data path based on what
the hidden data bits are. Table I provides a list of the
used components representing the device utilization of
the FPGA for this hardware engine.
Furthermore, the system checks the input file data
too. It searches in the carrier file to insert ZWC
depending on the hidden data. In other words, two sets
of inputs decide the next state transition in the state
diagram.
IV. SIMULATION RESULTS
Table III represents the simulation results of the file
size and number of bits added to web page carriers.
ZWC and space algorithm have the following
advantages
I. File format will not be changed.
II. Can be applied to any code (e.g. Unicode,
ASCII). In other word, this algorithm can be
applied to any language.
III. As Figure 1 shows, the file size will not be
affected.
Figure 1. Size effect after add secret data in carrier file
In our implementation, we process the hidden file
two bits in each step to hide it and then transition the
current state to another state based on the conditions.
Figure 4 shows the signal analysis of data inserted and
the system states transformation using a timing wave
graph.
The state transitions occur based on the conditions
of the input data characters and hidden data bits.
The critical path time reported by the tool (Quartus
II) is  . Hence,


 
We process 16 bits in each clock cycle. Therefore,
the system has an overall throughput of
6.415Gbits/second. This is while software simulations
would require O (n) time to process any file, and are
controlled by the file size and processor speed.
Table I. Device Utilization of the FPGA
Components
Name
Family
ALTERA Cyclone DE II
Met timing requirements
Yes
Total Logic elements
12/10570 (<1%)
Total pins
20/336 (6%)
Total virtual pins
0
Device
EP1S10F484C5
Table II provides a list of hardware-based
steganography algorithms. All the presented hardware
implementations process audio, image or video files. To
the best of our knowledge, there is no hardware systems
reported in the literature for processing text. The ZWC
Algorithm hardware implementation represents one of
the unique text Steganography algorithms, as it
provides very high speed processing of real-time
applications while maintaining a minimum memory
buffer use.
Table II. Steganography Hardware Engines
Algorithm
Strategy/Carrier file
[9]
2/3 Image Steganography
[10]
Noisy region of image
[11]
Audio, video
[12]
Image, Video
[13]
Multilayer and parallel Image
Proposed System
Text file/ without change file size
V. CONCLUSIONS AND FUTURE DIRECTIONS
In this paper, we presented a fast and real-time
hardware implementation for secure and safe
communications over networks. We have presented the
hardware implementation of the ZWC algorithm. The
proposed design represents one of the fastest text
steganography techniques in hardware. Previous
implementations provided efficient hardware
implementations over other carriers such as image,
video or audio files. This is the first hardware
implementation presented in literature for text
Steganography. In the future, we are planning to present
a parallel processing design to optimize the system
encryption speed and power consumption for the ZWC
algorithm as well as other text Steganography
algorithms.
0
20,000
40,000
60,000
1 2 3 4 5 6
page size (byte)
Website (page)
File Size Change
Orginal size
Worst case
Average
Best Case
10
01
00
11
00
00
00
00
01
01
01
01
10
10
10
10
11
11
11
Figure 2. Finite State Machine Diagram
Figure 3. RTL view of the hardware engine
Figure 4. Timing Simulation results of the hiding data algorithm and state transitions (where space as input).
Table III. File size and the number of bits added to carries web pages
REFERENCES
[1] V. Potdar and E. Chang, "Visibly Invisible: Ciphertext as
a Steganographic Carrier," in Proceedings of the 4th
International Network Conference (INC2004), 2004, pp.
385-391.
[2] T. Morkel, J. H. Eloff, and M. S. Olivier, "An overview
of image steganography," in ISSA, 2005, pp. 1-11.
[3] W. Bender, D. Gruhl, N. Morimoto, and A. Lu,
"Techniques for data hiding," IBM systems journal, vol.
35, pp. 313-336, 1996.
[4] N. F. Johnson and S. Katzenbeisser, "A survey of
steganographic techniques," in Information hiding, 2000,
pp. 43-78.
[5] P. Jayaram, H. Ranganatha, and H. Anupama,
"Information Hiding Using Audio SteganographyA
Survey," The International Journal of Multimedia & Its
Applications (IJMA) Vol, vol. 3, pp. 86-96, 2011.
[6] H. Singh, P. K. Singh, and K. Saroha, "A Survey on Text
Based Steganography," in Proceedings, 2009, pp. 26-27.
[7] A. Z. Al-Othmani, A. A. Manaf, and A. M. Zeki, "A
Survey on Steganography Techniques in Real Time
Audio Signals and Evaluation," International Journal of
Computer Science Issues(IJCSI), vol. 9, 2012.
[8] A. Odeh and K. Elleithy, "Steganography in Text by
Merge ZWC and Space Character," presented at the 28th
International Conference on Computers and Their
Applications, Honolulu, Hawaii, USA., 2013.
[9] B. J. Mohd, S. Abed, T. Al-Hayajneh, and S. Alouneh,
"FPGA hardware of the LSB steganography method," in
Computer, Information and Telecommunication Systems
(CITS), 2012 International Conference on, 2012, pp. 1-4.
[10] E. Gómez-Hernández, C. Feregrino-Uribe, and R.
Cumplido, "FPGA hardware architecture of the
steganographic context technique," in Electronics,
Communications and Computers, 2008. CONIELECOMP
2008, 18th International Conference on, 2008, pp. 123-
128.
[11] H. Farouk and M. Saeb, "Design and implementation of a
secret key steganographic micro-architecture employing
FPGA," in Design, Automation and Test in Europe
Conference and Exhibition, 2004. Proceedings, 2004, pp.
212-217.
[12] H. Leung, L. Cheng, L. Cheng, and C.-K. Chan,
"Hardware realization of steganographic techniques," in
Intelligent Information Hiding and Multimedia Signal
Processing, 2007. IIHMSP 2007. Third International
Conference on, 2007, pp. 279-282.
[13] A. F. Mahmood and N. A. Kanai, "An FPGA
Implementation of Secured Steganography
Communication System," Tikrit Journal of Engineering
Science, vol. 19, pp. 14-23, 2012.
[14] G. Gul and A. E. Dirik, "Steganalytic features for JPEG
compression-based perturbed quantization," Signal
Processing Letters, IEEE, vol. 14, pp. 205-208, 2007.
[15] J. Fridrich, M. Goljan, and D. Soukal, "Perturbed
quantization steganography," Multimedia Systems, vol.
11, pp. 98-107, 2005.
Web
web
Original
size
Number
of hidden
bits
Worst
case
Average
Best
Case
Space
Ratio
1
www.bbc.co.uk
13,348
3798
17146
15247
13,348
28.45
2
www.cnn.com
16,722
2340
19062
17892
16,722
13.99
3
www.nytimes.com
14,954
2286
17240
16097
14,954
15.29
4
education.astate.edu
40,960
6138
47098
44029
40,960
14.99
5
www.post-gazette.com
15,766
2214
17980
16873
15,766
14.04
6
www.aljazeera.com
18,184
2468
20652
19418
18,184
13.57
... In this section of statistics combined SNR of the proposed method. Now from the equation (a) the cumulative distribution function (CDF) of , [8] [9][10][11]. Now here Pr [ ≤ J+ K < i] can easily calculated from the cumulative distribution function of Lc/L-GSC where H is independent of J and K so the proposed algorithm can obtain the probabilities of (b) as, [5,12] Pr [K≥ H, J, K (j, k) 6H (h) dkdhdj [1][2][3][4][5][6][7][8][12][13][14] ...
... This section discusses the complexity tradeoff by analysing average number of path calculation, average number of signal to noise ratio comparison and the soft handover overhead. [9][10][11][15][16][17][18][19][20][21][22]. ...
... So the average number of path calculation of the Block change is same as that of hook replacement with full generalized selection combining (GSC). [9][10][11][15][16][17][18][19][20][21][22]. ...
Full-text available
Article
Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB) matching of Steganography embedding and extracting method.In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR) method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secures data transmission applications.
Full-text available
Article
Today’s large demand of internet applications requires data to be transmitted in a secure manner. Datatransmission in public communication system is not secure because of interception and impropermanipulation by eavesdropper. So the attractive solution for this problem is Steganography, which is the artand science of writing hidden messages in such a way that no one, apart from the sender and intendrecipient, suspects the existence of the message, a form of security through obscurity. Audio steganographyis the scheme of hiding the existence of secret information by concealing it into another medium such asaudio file. In this paper we mainly discuss different types of audio steganographic methods, advantages anddisadvantages.
Full-text available
Article
In a modern era of Information Technology, illicit copying and illegal distribution accompany the adoption of widespread electronic distribution of copyrighted material. This is the main reason why people think about how to protect their work and how to prevent such unlawful activities. For this purpose various methods including cryptography, steganography, coding and so on have been used. Steganography is the best-suited technique that allow user to hide a message in another message (cover media). Most of steganography research uses cover media as pictures, video clips and sounds. However, text steganography is not normally preferred due to the difficulty in finding redundant bits in text document. To embed information inside a document its characteristics should be altered. These characteristics can be either the text format or characteristics of the character. But the problem is that if slight change has been done to the document then it will become visible to the third party or attacker. The key to this problem is that to alter the document in such a way that it is simply not visible to the human eye yet it is possible to decode it with computer. For this purpose various methods of text-based steganography have been purposed like line shifting, word shifting, feature coding, white space manipulation etc. In this paper, we present an overview of the steganography, with a particular focus on text-based steganography in details.
Full-text available
Article
Steganography has proven to be one of the practical ways of securing data. It is a new kind of secret communication used mainly to hide secret data inside other innocent digital mediums. Most of existing steganographic techniques use digital multimedia files as cover mediums to hide secret data. Audio files and signals make appropriate mediums for steganography due to the high data transmission rate and the high level of redundancy. Hiding data in real time communication audio signals is not a simple mission. Steganography requirements as well as real time communication requirements are supposed to be met in order to construct a useful and useful data hiding application. In this paper we will survey the general principles of hiding secret information using audio technology, and provide an overview of current functions and techniques. These techniques will be evaluated across both, steganography and real time communication requirements.
Full-text available
Conference Paper
Secure communication is essential for data confidentiality and integrity especially with the massive growth of the internet and mobile communication. Steganography is an art for data hiding by embedding the data to different objects such as text, images, audio and video objects. In this paper we propose a new algorithm for data hiding using Text Steganography in Arabic language. Our algorithm uses the Zero Width Character from Unicode (U+200B) and space character to pass bits before and after space. Main advantage of our algorithm file format will not be change and this will decrease the ability of Stegoanalysis to observe hidden data. Moreover ZWC algorithm can be applied to any language (ASCII, Unicode).
Full-text available
Article
The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised then this goal is defeated. The success of steganography, to a certain extent, depends on the secrecy of the cover medium. Once the steganographic carrier is disclosed then the security depends on the robustness of the algorithm used. Hence, to maintain secrecy either we have to make the cover medium more robust against steganalysis or discover new and better cover mediums. We consider the latter approach much more effective, since old techniques get prone to steganalysis. In this paper, we present one such cover medium. We propose to use ciphertext as a steganographic carrier. (114 words)
Full-text available
Article
In this paper, we use the recently proposed wet paper codes and introduce a new approach to passive-warden steganography called perturbed quantization. In perturbed quantization, the sender hides data while processing the cover object with an information-reducing operation that involves quantization, such as lossy compression, downsampling, or A/D conversion. The unquantized values of the processed cover object are considered as side information to confine the embedding changes to those unquantized elements whose values are close to the middle of quantization intervals. This choice of the selection channel calls for wet paper codes as they enable communication with non-shared selection channel. Heuristic is presented that indicates that the proposed method provides better steganographic security than current JPEG steganographic methods. This claim is further supported by blind steganalysis of a specific case of perturbed quantization for recompressed JPEG images.
Conference Paper
Steganography is one of the most powerful techniques to conceal the existence of hidden secret data inside a cover object. Images are the most popular cover objects for steganography, and thus the importance of image steganography. Embedding secret information inside images requires intensive computations, and therefore, designing steganography in hardware speeds up steganography. This work presents a hardware design of Least Significant Bit (LSB) steganography technique in a cyclone II FPGA of the Altera family. The design utilizes the Nios embedded processor as well as specialized logic to perform the steganography steps. The design balances the tradeoffs such as imperceptibility, quality and capacity.