Acta Informatica Pragensia 2025, 14(3), 445-459 | DOI: 10.18267/j.aip.2711756

Enhancing Imperceptibility: Zero-width Character-based Text Steganography for Preserving Message Privacy

Saqib Ishtiaq ORCID...1, Naveed Ejaz ORCID...2, Muhammad Usman Hashmi ORCID...3, Syed Imran Hussain Shah ORCID...1
1 Department of Computing and Technology, Iqra University, Islamabad, Pakistan
2 School of Computing, Queen’s University, Canada
3 Department of Computer Science, Bahria University, Islamabad, Pakistan

Background: Text steganography preserves the privacy of secret messages by hiding them in cover text. However, existing text steganography techniques embed messages by introducing distortions in text, reducing the similarity between the cover and stegotext. Objective: The objective of this study was to design a method that increases the number of embedding choices and locations to hide more secret bits per distortion in the cover text. The goal is to enhance both embedding capacity and imperceptibility.

Methods: A text steganography method is proposed that uses eight zero-width characters (ZWCs) to embed secret messages in the cover text. The proposed method also treats every character in the cover text as a potential embedding location. With eight embedding choices and bit encoding based on embedding locations, more bits can be hidden with fewer insertions in cover text.

Results: Experimental results confirm that the proposed method embeds a greater number of bits per insertion of ZWC in the cover text. It also requires a smaller number of insertions to embed secret messages of comparable length. Consequently, the proposed method achieves higher embedding capacity and better imperceptibility compared to existing text steganography methods.

Conclusion: The proposed method presents a substantial improvement in text steganography by increasing embedding capacity per distortion and preserving high similarity between cover and stegotext, thus enabling more secure covert communication.

Keywords: Information hiding; Zero-width character text steganography; Text watermarking; Text processing; Imperceptibility.

Received: December 27, 2024; Revised: May 31, 2025; Accepted: June 1, 2025; Prepublished online: June 24, 2025; Published: August 19, 2025  Show citation

ACS AIP APA ASA Harvard Chicago Chicago Notes IEEE ISO690 MLA NLM Turabian Vancouver
Ishtiaq, S., Ejaz, N., Hashmi, M.U., & Imran Hussain Shah, S. (2025). Enhancing Imperceptibility: Zero-width Character-based Text Steganography for Preserving Message Privacy. Acta Informatica Pragensia14(3), 445-459. doi: 10.18267/j.aip.271
Download citation

References

  1. Ahmed, A., Iqbal, M. M., Jabbar, S., Ibrar, M., Erbad, A., & Song, H. (2023). Position-Based Emergency Message Dissemination Schemes in the Internet of Vehicles: A review. IEEE Transactions on Intelligent Transportation Systems, 24(12), 13548-13572. https://doi.org/10.1109/tits.2023.3304127 Go to original source...
  2. Ahvanooey, M.T., Li, Q., Hou, J., Mazraeh, H.D., & Zhang, J. (2018). Aitsteg: An innovative text steganography technique for hidden transmission of text message via social media. IEEE Access, 6, 65981-65995. https://doi.org/10.1109/access.2018.2866063 Go to original source...
  3. Ahvanooey, M. T., Zhu, M. X., Mazurczyk, W., Li, Q., Kilger, M., Choo, K. R., & Conti, M. (2022). CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks. Journal of Information Security and Applications, 71, 103368. https://doi.org/10.1016/j.jisa.2022.103368 Go to original source...
  4. Alanazi, N., Khan, E., & Gutub, A. (2020). Functionality-improved arabic text steganography based on unicode features. Arabian Journal for Science and Engineering, 45, 1037-11050. https://doi.org/10.1007/s13369-020-04917-5 Go to original source...
  5. Alanazi, N., Khan, E., & Gutub, A. (2022). Inclusion of unicode standard seamless characters to expand arabic text steganography for secure individual uses. Journal of King Saud University-Computer and Information Sciences, 34(4), 1343-1356. https://doi.org/10.1016/j.jksuci.2020.04.011 Go to original source...
  6. Al-Nofaie, S. M., Fattani, M. M., & Gutub, A. A. (2016). Merging two steganography techniques adjusted to improve Arabic text data security. Journal of Computer Science & Computational Mathematics, 59-65. https://doi.org/10.20967/jcscm.2016.03.004 Go to original source...
  7. Al-Nofaie, S.M.A., & Gutub, A.A.-A. (2020). Utilizing pseudo-spaces to improve arabic text steganography for multimedia data communications. Multimedia Tools and Applications, 79, 19-67. https://doi.org/10.1007/s11042-019-08025-x Go to original source...
  8. Al-Nofaie, S., Gutub, A., & Al-Ghamdi, M. (2021). Enhancing arabic text steganography for personal usage utilizing pseudo-spaces. Journal of King Saud University - Computer and Information Sciences, 33(8), 963-974. https://doi.org/10.1016/j.jksuci.2019.06.010 Go to original source...
  9. AminAli, A., & Saad, A. S. (2013). New Text Steganography Technique by using Mixed-Case Font. International Journal of Computer Applications, 62(3), 6-9. https://doi.org/10.5120/10058-4650 Go to original source...
  10. Askari, M., Mahmood, A., & Iqbal, Z. (2023). A novel font color and compression text steganography technique. In International Conference on Communication, Computing and Digital Systems (C-CODE), (pp. 1-6). IEEE. https://doi.org/10.1109/c-code58145.2023.10139867 Go to original source...
  11. Bertini, F., Rizzo, S.G., & Montesi, D. (2019). Can information hiding in social media posts represent a threat? Computer, 52(10), 52-60. https://doi.org/10.1109/mc.2019.2917199 Go to original source...
  12. Elmahi, M.Y., & Sayed, M. (2017). Text steganography using compression and random number generators. International Journal of Computer Applications Technology and Research, 6(6), 259-263. https://doi.org/10.7753/ijcatr0606.1005 Go to original source...
  13. Guan, B., Gong, L., & Shen, Y. (2022). A novel coverless text steganographic algorithm based on polynomial encryption. Security and Communication Networks, 2022(1), 1153704. https://doi.org/10.1155/2022/1153704 Go to original source...
  14. Grothoff, C., Grothoff, K., Alkhutova, L., Stutsman, R., & Atallah, M. (2005). Translation based steganography. In Information Hiding: 7th International Workshop, (pp. 219-233). Springer. https://doi.org/10.1007/11558859_17 Go to original source...
  15. Gurunath, R., & Samanta, D. (2023). A new 3-bit hiding covert channel algorithm for public data and medical data security using format-based text steganography. Journal of Database Management, 34(2), 1-22. https://doi.org/10.4018/jdm.324076 Go to original source...
  16. Huanhuan, H., Xin, Z., Weiming, Z., & Nenghai, Y. (2017). Adaptive text steganography by exploring statistical and linguistical distortion. In IEEE Second International Conference on Data Science in Cyberspace, (pp. 145-150). IEEE. https://doi.org/10.1109/dsc.2017.16 Go to original source...
  17. Iqbal, M.M., Khadam, U., Han, K.J., Han, J., & Jabbar, S. (2019). A robust digital watermarking algorithm for text document copyright protection based on feature coding. In 15th International Wireless Communications & Mobile Computing Conference, (pp. 1940-1945). IEEE. https://doi.org/10.1109/iwcmc.2019.8766644 Go to original source...
  18. Johnson, N.F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2), 26-34. https://doi.org/10.1109/mc.1998.4655281 Go to original source...
  19. Khadam, U., Iqbal, M.M., Jabbar, S., & Shah, S.A. (2021). Data aggregation and privacy preserving using computational intelligence. IEEE Internet of Things Magazine, 4(2), 60-64. https://doi.org/10.1109/iotm.0001.2000010 Go to original source...
  20. Kouser, S. K., Khan, A., & Qamar, E. (2016). A Novel Content-Based Feature Extraction Approach: Text Steganography. International Journal of Computer Science and Information Security, 14(12), 916-922.
  21. Kulkarni, R. (2022). A million news headlines. Kaggle. Retrieved from https://www.kaggle.com/datasets/therohk/million-headlines
  22. Kumar, R., Chand, S., & Singh, S. (2014). An email based high capacity text steganography scheme using combinatorial compression. In The 5th International Conference confluence the Next Generation Information Technology Summit, (pp. 336-339). IEEE. https://doi.org/10.1109/confluence.2014.6949231 Go to original source...
  23. Kumar, R., Malik, A., Singh, S., & Chand, S. (2016). A high capacity email based text steganography scheme using huffman compression. In The 3rd International Conference on Signal Processing and Integrated Networks, (pp. 53-56). IEEE. https://doi.org/10.1109/spin.2016.7566661 Go to original source...
  24. Lee, W. (2019). Ultra-light mutual authentication scheme based on text steganography communication. Journal of The Korea Society of Computer and Information, 24(4), 11-18. https://doi.org/10.15242/iie.e1014068 Go to original source...
  25. Liu, T.-Y., & Tsai, W.-H. (2007). A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security, 2(1), 24-30. https://doi.org/10.1109/tifs.2006.890310 Go to original source...
  26. Malik, A., Sikka, G., & Verma, H.K. (2017). high capacity text steganography scheme based on lzw compression and color coding. Engineering Science and Technology, an International Journal, 20 (1), 72-79. https://doi.org/10.1016/j.jestch.2016.06.005 Go to original source...
  27. Mansor, F.Z., Mustapha, A., & Samsudin, N.A. (2017). Researcher's perspective of substitution method on text steganography. IOP Conference Series: Materials Science and Engineering, 226, 012092. https://doi.org/10.1088/1757-899x/226/1/012092 Go to original source...
  28. Naqvi, N., Abbasi, A. T., Hussain, R., Khan, M. A., & Ahmad, B. (2018). Multilayer partially homomorphic encryption text steganography (MLPHE-TS): A zero steganography approach. Wireless Personal Communications, 103, 1563-1585. https://doi.org/10.1007/s11277-018-5868-1 Go to original source...
  29. Patiburn, S.A., Iranmanesh, V., & Teh, P.L. (2017). Text steganography using daily emotions monitoring. International Journal of Education and Management Engineering, 7(3), 1-14. https://doi.org/10.5815/ijeme.2017.03.01 Go to original source...
  30. Por, L.Y., Wong, K., & Chee, K.O. (2012). Unispach: A text-based data hiding method using unicode space characters. Journal of Systems and Software, 85(5), 1075-1082. https://doi.org/10.1016/j.jss.2011.12.023 Go to original source...
  31. Rafat, K. (2009). Enhanced text steganography in SMS. In The 2nd International Conference on Computer, Control and Communication, Go to original source...
  32. (pp. 1-6). IEEE. https://doi.org/10.1109/ic4.2009.4909228 Go to original source...
  33. Rashid, S. H., & Nasrawi, D. A. (2024). Coverless Text Information Hiding Based on Built-in Features of Arabic Scripts. Journal of Applied Data Sciences, 5(2), 653-667. https://doi.org/10.47738/jads.v5i2.243 Go to original source...
  34. Ray, A.M., Sarkar, A., Obaid, A.J., & Pandiaraj, S. (2021). IoT Security Using Steganography. In Multidisciplinary Approach to Modern Digital Steganography. IGI Global. https://doi.org/10.4018/978-1-7998-7160-6.ch009 Go to original source...
  35. Rizzo, S.G., Bertini, F., Montesi, D., & Stomeo, C. (2017). Text watermarking in social media. In IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (pp. 208-211). ACM. https://doi.org/10.1145/3110025.3116203 Go to original source...
  36. Satir, E., & Isik, H. (2014). A huffman compression based text steganography method. Multimedia tools and applications, 70, 2085-2110. https://doi.org/10.1007/s11042-012-1223-9 Go to original source...
  37. Satir, E., & Isik, H. (2012). A compression-based text steganography method. Journal of Systems and Software, 85(10), 2385-2394. https://doi.org/10.1016/j.jss.2012.05.027 Go to original source...
  38. Shearer, J., & Gutmann, P. (1996). Government, cryptography, and the right to privacy. Journal of Universal Computer Science, 2 (3), 113-146. https://doi.org/10.3217/jucs-002-03-0113 Go to original source...
  39. Shirali-Shahreza, M.H., & Shirali-Shahreza, M. (2008). A new synonym text steganography. In International Conference on Intelligent Information Hiding and Multimedia Signal Processing, (pp. 1524-1526). https://doi.org/10.1109/iih-msp.2008.6 Go to original source...
  40. Shirali-Shahreza, M., & Shirali-Shahreza, M.H. (2007). Text steganography in SMS. In International Conference on Convergence Information Technology, (pp. 2260-2265). IEEE. https://doi.org/10.1109/iccit.2007.100 Go to original source...
  41. Shirali-Shahreza, M. (2008). Text steganography by changing words spelling. In The 10th International Conference on Advanced Communication Technology, (pp. 1912-1913). IEEE. https://doi.org/10.1109/icact.2008.4494159 Go to original source...
  42. Shniperov, A. N., & Nikitina, K. A. (2016). A text steganography method based on Markov chains. Automatic Control and Computer Sciences, 50(8), 802-808. https://doi.org/10.3103/s0146411616080174 Go to original source...
  43. Thabit, R., Udzir, N.I., Yasin, S.M., Asmawi, A., & Gutub, A.A.-A. (2022). CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data. IEEE Access, 10, 65439-65458. https://doi.org/10.1109/access.2022.3182712 Go to original source...
  44. Tutuncu, K., & Abi Hassan, A. (2015). New approach in e-mail based text steganography. International Journal of Intelligent Systems and Applications in Engineering, 3(2), 54-57. https://doi.org/10.18201/ijisae.05687 Go to original source...
  45. Varghese, F., & Sasikala, P. (2023). A detailed review based on secure data transmission using cryptography and steganography. Wireless Personal Communications, 129(4), 2291-2318. https://doi.org/10.1007/s11277-023-10183-z Go to original source...
  46. Wang, K., & Gao, Q. (2019). A coverless plain text steganography based on character features. IEEE Access, 7, 95665-95676. https://doi.org/10.1109/ACCESS.2019.2929123 Go to original source...
  47. Wu, D.-C., & Hsu, Y.-T. (2022). Authentication of line chat history files by information hiding. ACM Transactions on Multimedia Computing, Communications, and Applications, 18(1), 1-23. https://doi.org/10.1145/3474225 Go to original source...
  48. Wu, N., Shang, P., Fan, J., Yang, Z., Ma, W., & Liu, Z. (2019). Coverless text steganography based on maximum variable bit embedding rules. Journal of Physics Conference Series, 1237(2), 022078. https://doi.org/10.1088/1742-6596/1237/2/022078 Go to original source...
  49. Wu, N., Yang, Z., Yang, Y., Li, L., Shang, P., Ma, W., & Liu, Z. (2020). STBS-Stega: Coverless text steganography based on state transition-binary sequence. International Journal of Distributed Sensor Networks, 16(3), 155014772091425. https://doi.org/10.1177/1550147720914257 Go to original source...
  50. Yang, Z., Zhang, P., Jiang, M., Huang, Y., & Zhang, Y.-J. (2018). Rits: Real-time interactive text steganography based on automatic dialogue model. In International Conference on Cloud Computing and Security, (pp. 253-264). Springer. https://doi.org/10.1007/978-3-030-00012-7_24 Go to original source...

This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.