=Paper=
{{Paper
|id=Vol-3736/paper20
|storemode=property
|title=Modification of the RGB Color Space in MS Word Documents for Steganographic Information Protection
|pdfUrl=https://ceur-ws.org/Vol-3736/paper20.pdf
|volume=Vol-3736
|authors=Vladimir Barannik,Mykhailo Babenko,Yurii Babenko,Kateryna Yalova,Kseniia Yashyna
|dblpUrl=https://dblp.org/rec/conf/icyberphys/BarannikBBYY24
}}
==Modification of the RGB Color Space in MS Word Documents for Steganographic Information Protection==
Modification of the RGB Color Space in MS Word Documents for Steganographic Information Protection⋆ Vladimir Barannik1,†, Mykhailo Babenko2,†, Yurii Babenko3,∗,†, Kateryna Yalova2,† and Kseniia Yashyna4,† 1V. N. Karazin Kharkiv National University, Svobody Square 4, Kharkiv, 61000, Ukraine 2Dniprovsky State Technical University, Dniprobydivska Street 2, Kamianske, 51918, Ukraine 3Taras Shevchenko National University of Kyiv, Volodymyrska Street 64/13, Kyiv, 01601, Ukraine 4SIRIS Academic, Av. Francesc Cambo 17, 08003, Barcelona, Spain Abstract Images, audio, and video are commonly used for steganography. However, text is an ideal medium for steganography due to its ubiquity and smaller size. Text steganography involves hiding information within text. Traditional steganographic methods using multimedia files often rely on replacing the least significant bit of the original data with a bit mask of the hidden information. In this paper, we adapt this method for text steganography. We present an algorithm that uses a modified least significant bit approach to subtly alter the color parameters of text characters in a Microsoft Office Word file by modifying the low-order bits of the RGB color channels of the text characters. These changes are completely imperceptible to the human eye. We have developed software that implements this algorithm, allowing for the embedding and extraction of hidden information. Keywords text steganography, MS Word document, least significant bit method, RGB color space, confidentiality, hiding information, information security, coding1 1. Introduction The rapid growth of technology in recent years has led to the generation of a vast amount of information, which is typically transmitted over unsecured network channels. The Internet, in particular, has gained widespread popularity for the exchange of digital data, utilized by both private individuals and governmental organizations. Despite the numerous advantages of such information exchange, a significant drawback remains the confidentiality and security of the ICyberPhyS-2024: 1st International Workshop on Intelligent &CyberPhysical Systems, June 28, 2024, Khmelnytskyi, Ukraine ∗Corresponding author. †These authors contributed equally. v.v.barannik@karazin.ua (V. Barannik); mvbab130973@gmail.com (M. Babenko); babenkomahalych@gmail.com (Y. Babenko); yalovakateryna@gmail.com (K. Yalova); yashinaksenia85@gmail.com (K. Yashyna) 0000-0002-2848-4524 (V. Barannik); 0000-0003-1013-9383 (M. Babenko); 0000-0002-8115-3329 (Y. Babenko); 0000- 0002-2687-5863 (K. Yalova); 0000-0002-8817-8609 (K. Yashyna) © 2023 Copyright for this paper by its authors.Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR ceur-ws.org Workshop ISSN 1613-0073 Proceedings data. The availability of various easily accessible tools capable of compromising the confidentiality, integrity, and security of transmitted data has enabled the emergence of diverse malicious threats. The most common solution to this issue is cryptography, where data is encrypted into ciphertext using an encryption key. On the receiving end, the ciphertext is decrypted back into plaintext using a decryption key. While encryption ensures that the original data is not visible, the presence of ciphertext in its encrypted form is noticeable, raising suspicions and prompting further investigation. Consequently, a new area of research, steganography, has gained attention, allowing for the concealment of data in a manner that is invisible to the human eye [1, 2]. Methods of hiding information have existed for a long time [3, 4], but their significance has recently increased [5, 6]. The primary reason for this is the growing volume of data traffic over the Internet and social media. Although the goals of cryptography and steganography are similar, there is a fundamental difference between them. Cryptography makes data unbreakable and unreadable, but the ciphertext is visible to the human eye. In contrast, the distinctive feature of the steganographic approach is that it does not explicitly reveal the existence of protected information. This characteristic allows for solving important information security tasks within the traditionally existing information flows or environments. The term "steganography" refers to hidden messages that completely eliminate the possibility of third-party detection. Thus, an uninformed person fundamentally cannot decipher the message because they are unaware of its existence. In other words, while cryptography conceals the content of a message, steganography conceals the very existence of the message. Cryptography remains the most popular method of information hiding, but steganography has been gaining increasing popularity recently. The most promising method appears to be the combination of cryptography and steganography, where already encrypted information is hidden. Computer steganography is based on two main principles: 1. Files that do not require absolute precision (such as image, video, or audio files) can be modified to some extent without losing functionality. 2. The lack of specialized tools or the human sensory system's inability to reliably detect minor changes in such files. The basic approaches to implementing computer steganography methods involve identifying insignificant fragments within a medium and replacing the existing information in those fragments with the information intended to be protected. Since computer steganography deals with environments supported by computational means, the entire information environment can ultimately be represented in digital form. Thus, fragments that are insignificant to the frame of the information environment are replaced (or mixed) with fragments of the hidden information according to a specific algorithm [6]. This means that a family photo can contain commercial information, and a file with a favorite melody can hide a secret message. In the context of implementing software and hardware protection in information systems, two main approaches are distinguished: 1. Embedded Protection: Protection mechanisms are distributed across other components of the system or implemented as separate elements of the information system. 2. Additional Protection: Protection mechanisms serve as supplements to the primary hardware and software components of the information system. The second approach is more flexible, allowing protection mechanisms to be added or removed as needed. However, its implementation may encounter issues with ensuring compatibility between different protection methods and the software-hardware complex of the information system. Embedded protection is considered more reliable and optimal but is also more rigid, making it difficult to modify. Due to these characteristics, real-world systems often combine both approaches to leverage their respective advantages. 2. Related Works Existing algorithms for embedding secret information can be categorized into several groups: 1. Algorithms that operate directly on the digital signal. This group includes the LSB (Least Significant Bit) method [6, 7], which will be used further in this study. 2. Embedding secret information. In this case, the hidden image, sound, or text is superimposed on the original content. This method is often used for embedding digital watermarks (DWM). 3. Utilizing file format capabilities. This involves embedding information into metadata or other reserved fields of a file that are not used. Steganographic methods that use multimedia files as containers often rely on replacing the least significant bit of the original data with a bit mask of the hidden information. This approach alters the bit distribution pattern. To avoid significantly disrupting the structure of the original data, either pseudorandom filling is used, or the original data's density distribution function is analyzed, and the container is filled according to the identified pattern. In the study [8], a method for embedding data into image fragments with a high level of decorrelation is proposed, which corresponds to a high level of fractality. Embedding hidden data only in those fragments where the data is least structured allows for more reliable embedding. Recently, increasing attention has been given to deep learning technology, which has become a powerful tool in various applications, including image steganography. In [9], the authors explore different deep learning methods available in the field of image steganography. They categorize deep learning methods for image steganography into three groups: traditional methods, convolutional neural network-based methods, and generative adversarial network- based methods. Images, audio, and video are among the most popular carriers for steganography. Hiding information in video containers is particularly relevant because these containers have an immense amount of redundant data, allowing for the effective concealment of large volumes of information. Numerous studies have been dedicated to this topic by both local researchers [10–12] and international researchers [13–15]. Image, audio, and video steganography have received significant attention due to their visual and auditory nature, making them attractive for hiding information. However, text steganography, despite being less popular, is gaining momentum. In the era of ubiquitous electronic document circulation, text becomes a key element of data exchange. This growth is driven by the need to ensure confidentiality and protect information in the digital environment, making text steganography an important and promising field. Therefore, hiding information in text documents is becoming increasingly relevant, although there are not as many publications on this topic as it deserves. Images, audio, and video are some of the most popular carriers for steganography. However, text is ideal for steganography due to its ubiquity and smaller size compared to these media. Text steganography involves hiding information within text. Text has been one of the oldest means of hiding data, with letters, books, and telegrams being used to conceal secret messages before the advent of digital steganography. Additionally, text documents are among the most common digital media today, found in the form of newspapers, books, web pages, source codes, contracts, advertisements, and more. Therefore, the development of text steganography and steganalysis is very important. On one hand, methods for hiding data in text documents pose a significant threat to cybersecurity and can be a new communication tool for terrorists and other criminals. On the other hand, these methods can have legitimate applications in document tracking, copyright protection, authentication, and the investigation of counterfeits and forgeries. Since the plan is to embed hidden data into a text file, let's consider the most common methods of text steganography for this purpose: 1. Case Modification: Assume that uppercase letters represent bits with a value of one, and lowercase letters represent bits with a value of zero. Using this approach, a text of length N can hide a message of N/5 characters, which is quite inconvenient. 2. Whitespace Modification: Assume that a single space represents a bit "0", and two spaces represent a bit "1". The program takes any text as a container and embeds the message by replacing its bits with the corresponding number of spaces. The encoding method plays an important role here. The character code should be of optimal length, and double spaces should occur as rarely as possible. 3. Line-Shift Coding: This technique changes the distance between lines in electronic text to encode information. 4. Word-Shift Coding: This method changes the distance between words in a text. It involves identifying the maximum and minimum distances between words and assigning them values of 1 and 0, respectively, while other distances are adjusted accordingly. A specific case of this method is the previously mentioned whitespace modification method. 5. Feature Coding: This involves making specific changes to the fonts of individual letters, such as varying the length of the descender in the letter "p". 6. Using Characters from Different Alphabets with Identical Appearance: For example, the letter "і" has the same appearance in both the Ukrainian and English alphabets. Assume that the Ukrainian "і" represents bit "0" and the English "і" represents bit "1". Given that many letters have this property ("а", "е", "о", "р", etc.), a significant amount of information can be hidden. 7. Using the Order of End-of-Line Markers (CR/LF): Typically, text display tools are indifferent to the order of the carriage return (CR) and line feed (LF) symbols that end a line of text. Assume that the traditional combination CR/LF represents "0", while the inverted LF/CR represents "1". In [16-18], a new method of text steganography called AITSteg is proposed, which provides end-to-end protection during the transmission of text messages via SMS or social networks between end users. The authors claim that the proposed method can hide a large volume of secret information within a short message in such a way that the embedding trace is completely invisible to observers. Additionally, the method implements a combination of mathematical encoding and symmetric key algorithms, which generates different secret bits even for the same confidential information at different times, making it completely secure against attacks, including "man-in-the-middle" attacks, message disclosure, and manipulation by readers. Microsoft Word is one of the most popular word processors, and several methods exist for embedding data into documents created with it. In [19], a new type of data hiding method in Microsoft Word documents, called property coding, is presented. This method uses the properties of various document objects (such as characters, paragraphs, and sentences) to embed data. The authors present four different property coding techniques that are resilient to saving actions, impose very low overhead on document size (about 1%), can embed up to 8 bits per character, and, of course, remain unnoticed by readers. Property coding belongs to the formatting methods of text steganography. In [20], a new method of text steganography in Microsoft Word documents is proposed. The main idea is that setting any foreground color for invisible characters, such as spaces or carriage returns, does not display during document viewing. The method presented in [21] considers font types and works by replacing the font with a similar one. The secret message is encoded and embedded using similar fonts in the capital letters of the container text. The proposed text steganography method can work in various accompanying documents with different font types. The container size increases by approximately 0.766% from the original size. The performance of this method is very high, and the secret message remains invisible to an adversary. 3. Proposed methodology 3.1. LSB methodology The methods discussed above are easily embedded into any text, regardless of its content, purpose, or language. However, these methods are unfortunately susceptible to being broken, allowing the secret information to become accessible to third parties. Another major drawback is that these methods cannot transmit a large amount of hidden information. Therefore, in this work, we apply the LSB method to text steganography, which is typically used with graphical images and digital signals [5–9], but in a modified form known as LSB matching. This modified method is considered more resistant to many steganalysis techniques. The key features of this method include, first, the use of a sequence of random binary numbers during encoding and, second, the use of addition and subtraction during the replacement of the last bit, conducted in "regular" binary arithmetic (with carry-overs) [22, 23]. The LSB (Least Significant Bit) replacement method is a fundamental technique in the field of steganography. It involves replacing the least significant bits in the main container, such as images, audio, or video, with the hidden bits of the message. The goal is for the visual or auditory difference between the original and modified containers to be imperceptible to the human observer [1, 2, 6, 7]. Let's describe the classic LSB replacement method. For example, consider an 8-bit grayscale image, where each pixel's color is stored in eight bits. In this case, '00h' (00000000b) represents black, and 'FFh' (11111111b) represents white, giving a total of 256 possible shades of gray. Suppose the message to be hidden consists of one byte, such as '01101011b'. If two least significant bits in the pixel descriptions are used, then four pixels are needed to hide the message. For simplicity, let's assume the pixels are black. Then, the pixels containing the hidden message will have the following bit sequences: '00000001', '00000010', '00000010', and '00000011'. This manipulation results in very small color changes: the first pixel changes by 1/255, the second and third by 2/255, and the fourth by 3/255. These changes are practically imperceptible to the human eye, especially when viewed on low-quality display devices. The situation is even better when using a color image, where each pixel's color spectrum is stored in twenty-four bits (three bytes—one byte per color channel), resulting in a total of 16,777,216 (2^24) possible color shades (Figure 1). Figure 1: The least significant bits of a color image’s pixel To hide one bit of information, the least significant bit of one of the color channels of a pixel needs to be replaced. Therefore, one pixel can contain three bits of hidden information. To hide one byte, three pixels are needed, which can store nine bits – the original byte plus one "extra" bit that remains unmodified, which is not very efficient. For example, the process of hiding the character "S" (ASCII code – 83, in binary 01010011) is illustrated in Figure 2. When using the two least significant bits from each color channel of a pixel, hiding one byte of information requires using all three color channels of one pixel and one color channel of another pixel, which is also not very convenient (Figure 3). To hide one byte of information, the optimal scheme would be as follows: replace three least significant bits in the red channel, three in the green channel, and two in the blue channel (Figure 4). This way, one byte of information can be hidden in one pixel. However, such significant changes in the color channels can noticeably distort the container image, making it detectable. Figure 2: Hiding character “S” using the LBS method Figure 3: Using two of the least significant bits The LSB replacement method is a widely-used and straightforward technique in spatial steganography. Since the least significant bit of an image carries the least amount of information, it is an ideal medium for hiding secret data within image data. Essentially, the least significant bit acts as noise within the environment, and humans typically cannot detect changes in this bit. In grayscale images (where each pixel is encoded with one byte), this method can potentially conceal up to 1/8 of the total container volume. For example, an image with a resolution of 512×512 can hold approximately 32 KB of hidden information. By altering two least significant bits, which is also barely noticeable, this capacity can be doubled. Figure 4: Scheme for using the LSB method to hide one byte of information in one pixel The popularity of this method stems from its simplicity and its ability to hide significant amounts of data in relatively small files, creating a covert communication channel with a bandwidth ranging from 12.5% to 30%. However, it is important to recognize that the LSB method is vulnerable to various passive and active intrusion techniques. Its primary disadvantage is its sensitivity to even minor distortions in the container. To mitigate this issue, error-resilient coding is often employed. Additionally, LSB methods are unstable in the presence of noise in the transmission channel. The algorithm proposed in this study is based on modifying the color space of the container, specifically the color parameters of text characters in the RGB model. The fundamental element of the container, whose properties are altered during information embedding, is the text character of an electronic document. This algorithm utilizes LSB matching, which enhances the security of the steganographic embedding. The container for the secret data will be an Office Open XML format file, exemplified by a Microsoft Office Word document with the docx extension. Why choose the docx format instead of doc or txt? There are several compelling reasons. First, a docx file, unlike a doc file, is a zip archive containing XML documents that can be unpacked to retrieve all necessary information: text, images, tables, etc. This makes it relatively easy to embed and extract hidden data. Second, docx is the most popular and widely- used format, and its frequent use will not arouse suspicion regarding embedded data, which is a significant advantage. Third, docx files are much smaller in size compared to their doc counterparts, particularly in files containing numerous images or charts. Using the C# programming language, software has been developed to hide secret information in such a way that no one else can detect its presence. Additionally, the software ensures the capability to extract the hidden message from the container where it has been embedded. 3.2. Proposed LSB methodology modification As mentioned earlier, the human eye cannot distinguish slight shades of the same color. This is also applicable to text steganography, as demonstrated in [24, 25]. This can be effectively utilized in developing an algorithm for embedding secret data into a text container in docx format. The essence of this algorithm is as follows. We have a message that needs to be hidden in a document with the docx extension. The document itself must already contain textual information. The volume of this information will determine the amount of data that can be embedded. The more text the document contains, the more data can be hidden within it. The data is embedded into the RGB color channels of each text character in the file. To do this, we first need to parse the Word document to extract all necessary data: the text and the color information of each character in RGB format. The extracted color components are then converted to binary, and the least significant bits of the color components are replaced with the bits of our message. Let's explain this in more detail with an example. Suppose 1 byte of our message looks like this: 10101010. We split this message into three parts (corresponding to the RGB channels – 101 010 10) and replace the last bits. Using black as the base color (binary representation 00000000), the result will be as follows: • R: 00000101 = 5 • G: 00000010 = 2 • B: 00000010 = 2 The final result, after converting back to RGB format, will be the color corresponding to rgb(5,2,2). This is a shade of black. Since the human eye's ability to differentiate between slight shades of the same color is limited, such a transformation will remain unnoticed (Figure 5). Figure 5: The letter «S» in black (a) and with a shade of black rgb(5,2,2) (b) This operation will not introduce distortions in the color noticeable to the human eye. Instead, it will allow us to embed exactly 1 byte of our message into the color of each character in the input file. Thus, the maximum number of bytes (or characters) that can be hidden will be equal to the number of characters in the docx document, including spaces, tabs, carriage return symbols, and line feed symbols. Next, we need to determine the maximum number of bits that can be embedded in one RGB channel without causing significant changes to the character's color. How many bits can be embedded across all three channels so that the resulting color remains unchanged to the point of being imperceptible upon simple viewing? To address this, we will conduct an experiment, gradually increasing the number of modified least significant bits. The results are presented in Table 1. Table 1 Results of embedding varying numbers of bits into one RGB channel Symbols in different Binary color description font colors S R – 00000000 G – 00000000 B – 00000000 S R – 00000001 G – 00000001 B – 00000001 S R – 00000011 G – 00000011 B – 00000011 S R – 00000111 G – 00000111 B – 00000111 S R – 00001111 G – 00001111 B – 00001111 S R – 00011111 G – 00011111 B – 00011111 S R – 00111111 G – 00111111 B – 00111111 S R – 01111111 G – 01111111 B – 01111111 S R – 11111111 G – 11111111 B – 11111111 In the last row, the letter "S" became invisible because it was white on a white background. We can conclude that replacing five or even six least significant bits does not result in visible changes to the black color of the character. However, for reliable concealment, it is better to limit the replacement to four or even three bits. Thus, similar to the case with raster images, the optimal scheme for hiding one byte of information would be to use three least significant bits in the red channel, three in the green channel, and two in the blue channel. Embedding more bits into the color channels makes the color change noticeable, which is undesirable. The conclusions are summarized in Table 2. Table 2 Conclusions on embedding different number of bits in one RGB channel for hiding one byte of information Number of bits Data volume that can be Appearance in the container embedded in one RGB embedded in the channel container 1 bit per color channel N/8, where N is the No visible changes, but the number of container volume of embedded information characters is significantly small 2 bits in the R channel, N/4, where N is the No visible changes, the volume 2 bits in the G number of container of embedded information is channel, 2 bits in the B characters twice as large compared to the channel, 2 bits in the R previous case channel of the next character 3 bits in the R channel, N, where N is the number No visible changes, the volume 3 bits in the G of container characters of embedded information is channel, 2 bits in the B satisfactory channel (1 byte per color) 4 bits per color 3/2*N, where N is the The volume of embedded channel number of container information is larger than in the characters previous case, but the color changes are more noticeable 4. Results Thus, information of any type can be embedded as long as it is represented in binary form. However, it is crucial to monitor the length of the message that is to be embedded. If the message length exceeds the capacity of the container, the embedding process will not be feasible. In such situations, a decision must be made regarding whether to increase the size of the container or to reduce the length of the message to fit within the available space. Similarly, data extraction from the container follows the same principles. To retrieve the embedded message, one must parse the Word document to obtain the RGB color values of the text characters. The last bits of each RGB channel must be read to reconstruct the hidden data. Each combination of these bits will constitute one byte (or character) of the concealed message. By repeating this process for all modified character’s colors in the text, the entirety of the hidden message will be revealed. Future research will be directed towards enhancing the protection of the embedded information. This will involve encrypting the data using cryptographic methods to ensure it is secure from unauthorized access. After encryption, the data will be compressed using archiving tools such as ZIP or RAR to reduce its size and add an additional layer of protection. Additionally, a hash of the hidden message will be embedded into the container to ensure the integrity of the information. The hash will be embedded using the same algorithm but will be stored separately from the main message. Only after these steps will the data be embedded into the text container using the aforementioned method. This comprehensive approach aims to significantly enhance the security level of the embedded information, making it more resistant to detection and unauthorized access. 5. Conclusions Thus, steganographic methods for hiding information in Microsoft Office Word documents have been considered. Based on one of these methods (LSB matching, which is typically not used in text steganography) and using the RGB color model, an algorithm for embedding hidden data in a Microsoft Word document with a docx extension has been developed. This algorithm is based on the replacement of the least significant bit in the color space of characters in electronic documents. Additionally, software that fully implements this algorithm has been created using the C# programming language. References [1] A. Podder, P. Roy, S. Roy. Steganography techniques – an overview. International Journal of Scientific Research in Computer Science, engineering and information technology, 8 (2022) 300–304. doi: 10.1007/s00521-022-07366-3. [2] Y. Yong. Development and future of information hiding in image transformation domain: A literature review, in: Proceedings of the 4th International Conference on Image Processing and Machine Vision, IPMV ’22, ACM Press, New York, NY, 2022, pp. 72–77. doi: 10.1145/3529446.3529458. [3] J. T. Brassil, S. L., N. F. Maxemchuk, L. O’Gorman. Electronic Marking and Identification Techniques to Discourage Document Copying. IEEE Journal on Selected Areas in Communications, 13(1995) 1495–1504. doi:10.1109/49.464718. [4] W. Bender, D. Gruhl, N. Morimoto, A. Lu. Techniques for Data Hiding. IBM Systems Journal, 35 (1996) 313–336. doi:10.1147/sj.353.0313. [5] S. Dhawan, R. Gupta. Analysis of various data security techniques of steganography: A survey. Information Security Journal: A global Perspective, 30 (2021) 63–87. [6] S. Ghoul, R. Sulaiman, Z. Shukur. A review on security techniques in image steganography. International Journal of Advanced Computer Science and Applications, 14 (2023) 361–385. doi: 10.14569/IJACSA.2023.0140640. [7] O. Awe, O.A. Olukiran, O. Aienko, F. A. Taofeek-Ibrahim. A survey of image steganography using Least Significant Bit (LSB). Electronics and computers science, 20 (2020) 1–8. [8] M. A. Aslam, M. Rashid, F. Azam, M. Abbas. Image steganography using Least Significant Bit (LSB) – A Systematic Literature Review, in: Proceedings of 2nd International Conference on Computing and Information Technology, ICCIT’22, UT, Tabuk, Saudi Arabia, 2022, pp. 32–38. [9] N. Subramanian, O. Elharrouss, S. Al-Maadeed, A. Bouridane. Image Steganography: A Review of the Recent Advances. IEEE Access, 9 (2021) 23409–23423. doi: 10.1109/ACCESS.2021.3053998. [10] V. Barannik, M. Babenko. A Method of Scrambling for the System of Cryptocompression of Codograms Service Components, in: M. Klymash, A. Luntovskyy, M. Beshley, I. Melnyk, A. Schill, A. (Eds.), Lecture Notes in Electrical Engineering, volume 965. Springer, Switzerland, Cham, 2023, pp. 444–459. doi: 10.1007/978-3-031-24963-1_26. [11] V. Barannik, M. Babenko, A. Berchanov, V. Barannik, R. Onyshchenko, L. Kolodiichuk, Method of Mini Segments Encoding in Difference Space Using Haar Wavelet, in: Proceedings of the 5th International Conference on Advanced Information and Communication Technologies, AICT’23, Lviv, Ukraine, 2023, pp. 1–4. doi: 10.1109/AICT61584.2023.10452674. [12] T. Belikova, M. Babenko, A. Vlasov, P. Hurzhii, N. Korolyova, O. Voitsekhivska, Methodology for Assessing the Security of Encoded Video Information Resources of Video Conferencing in Public Administration, in: Proceedings of the 4th International Conference on Advanced Trends in Information Theory, ATIT’22, Kyiv, Ukraine, 2022, pp. 57–60. doi: 10.1109/ATIT58178.2022.10024230. [13] J. M. Jenifer, S. R. Ratna, J. B. S Loret, D. M. Gethsy. A Survey on Different Video Steganography Techniques, in: Proceedings of the 2nd International Conference on Trends in Electronics and Informatics, ICOEI’18, Tirunelveli, India, 2018, pp. 627–632. doi: 10.1109/ICOEI.2018.8553847. [14] G. R. Manjula, R. B. Sushma. Video Steganography: A Survey of Techniques and Methodologies, 2021. URL: http://dx.doi.org/10.2139/ssrn.3851241. [15] S. Kamil, M. Ayob, S.N.H.S. Abdullah, Z. Ahmad. Challenges in multi-layer data security for video steganography revisited, Asia-Pacific Journal of Information Technology and Multimedia, 7 (2018) 53–62. doi: 10.17576/apjitm-2018-0702(02)-05. [16] M. T. Ahvanooey, Q. Li, J. Hou, H.D. Mazraeh, J. Zhang. AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media. IEEE Access, 6 (2018) 65981–65995. doi: 10.1109/ACCESS.2018.2866063. [17] M. T. Ahvanooey, Q. Li, J. Hou, A.R. Rajput, Y. Chen. Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis. Entropy, 21 (2019) 350 – 381. doi: 10.3390/e21040355. [18] M. T. Ahvanooey, Q. Li, H. J. Shim, Y. Huang, A Comparative analysis of information hiding techniques for copyright protection of text documents. Security and Communication Networks, 2018 (2018) 1–22. doi: 10.1155/2018/5325040. [19] M. A. Majeed, R. Sulaiman, Z. Shukur, K. Hasan. A review on text steganography techniques. Mathematics, 9 (2021) 1–28. doi: 10.3390/math9212829. [20] S. Mahato, D. A. Khan, D. K. Yadav. A modified approach to data hiding in Microsoft Word documents by change-tracking technique. Computer and Information Sciences, 32 (2020) 216- 224. doi: 10.1016/j.jksuci.2017.08.004. [21] K. F. Rafat, M. J. Hussain. Secure text steganography for Microsoft Word Document. International Journal of electrical and information engineering, 11 (2017) 736–741. [22] Y. Hu, X. Li, J. Ma. A novel LSB Matching algorithm based on information pre-processing. Mathematics, 10 (2022) 1–16. doi: 10.3390/math10010008. [23] L. Nechvoloda, K. Krykunenko, K. Paramonova. Application of a mathematical model for the generation of separate elements of a steganographic system in a higher education institution. Computer Systems and Information Technologies, 2 (2023) 48–54. doi: 10.31891/csit-2023-2-6. [24] R. Thabit, N. I. Udzir, S. M. Yasin, A. Asmawi, A. A.-A. Gutub. CSNTSteg: color spacing normalization text steganography model to improve capacity and invisibility of hidden data. IEEE Access, 10 (2022) 65439–65458. doi: 10.1109/ACCESS.2022.3182712. [25] B. Osman, N. I. Yahya, K. M. Zaini, A. Abdullah. Text steganography using the second quotient remainder theorem and dark colour schemes. Journal of Computational Innovation and Analytics, 2(1) (2023) 21–40. doi: 10.32890/jcia2023.2.1.2.