Using Invisible Characters to Hide Text within Text
DOI:
https://doi.org/10.32628/IJSRSET25121172Keywords:
Invisible Characters, Hidden Text, Steganography, Encoding Secrets in Text, Information HidingAbstract
This study investigates a unique method of using invisible characters in text to conceal critical information from view. The idea of steganography has been thoroughly researched in a number of fields, such as audio and picture processing. But in recent years, there hasn't been much focus on using invisible characters in text-based steganography. In order to hide content within plain text, our method makes advantage of the Unicode character set, which has a variety of invisible characters. We provide a steganography technique that conceals sensitive information in a way that is invisible to the human eye by embedding secret text into a cover text using a mix of invisible letters and zero-width gaps. Because it makes it possible to transmit dangerous information through seemingly innocent language without raising suspicions, this technique has important ramifications for secure communication. Additionally, our solution may be used with current encryption techniques to give sensitive data an extra degree of protection.
Downloads
References
An Improved DCT based Steganography Technique • September 2014 • International Journal of Computer Applications 102(14):46-49 DOI:10.5120/17887-8861
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures Neil F. Johnson، Zoran Duric، Sushil Jajodia • 2012
Katzenbeisser and Petitcolas:“Information hiding techniques for steganography and digital watermarking”, Artech house, 2000
Steganography in Digital Media Principles, Algorithms, and Applications Jessica Fridrich • 2010
Bulent Sanker “Defeating statistical steganalysis”, bogazici university, 2002.
Adeeb Haghad and R.AS. “A new technique for text information hiding” , Journal of first workshop on information hiding technologies , 2002
Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography September 2010 International Journal of Computer Applications 8(9)DOI:10.5120/1238-1714SourceDOAJ
An Innovative Idea for Public Key Method of Steganography]J4R - Journal for Research2016,Journal 4 Research - J4R Journal
Introduction to digital image steganography M Hassaballah, MA Hameed, MH Alkinani - Digital Media Steganography, 2020 - Elsevier
Digital Image Processing and Analysis Computer Vision and Image Analysis Scott E Umbaugh • 2023
Cochran, J. T. , ”Steganographic computer warfare”, Airforce Institute of technology, Ohio, USA, March 2000.
Digital Image Processing FOURTH EDITION Rafael C. Gonzalez • Richard E. Woods
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.