I.J. Computer Network and Information Security, 2014, 1, 55-60 Published Online November 2013 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2014.01.08 Copyright © 2014 MECS I.J. Computer Network and Information Security, 2014, 1, 55-60 A Novel Approach of Text Steganography using Nonlinear Character Positions (NCP) Sabyasachi Samanta 1 , Saurabh Dutta 2 , Goutam Sanyal 3 1 Haldia Institute of Technology, Haldia, WB, INDIA 2 Dr. B. C. Roy Engineering College, Durgapur, WB, INDIA 3 National Institute of Technology, Durgapur, WB, INDIA sabyasachi.smnt@gmail.com 1 ; saurabh.dutta@bcrec.org 2 ; nitgsanyal@gmail.com 3 AbstractUsually, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders and to protect the data from the prying eyes. This paper presents a survey of text steganography method used for hiding secret information inside some cover text. Here the text steganography algorithms based on modification of font format, font style et cetera, has advantages of great capacity, good imperceptibility and wide application range. The nonlinear character positions of different pages are targeted through out the cover with insignificant modification. As compared to other methods, we believe that the approaches proposed convey superior randomness and thus support higher security. Index TermsText steganography, Nonlinear character position (NCP), Security, Data hiding. I. INTRODUCTION Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. Steganography is derived from the Greek word steganos which literally means ―Covered‖ and graphy means ―Writing‖, i.e. covered writing. Steganography refers to the science of ―invisible‖ communication. Digital form of media as a cover-object being use in steganography are images, video clips, music or sounds. Capacity, security, and robustness, are the three main aspects affecting steganography and its usefulness. Capacity refers to the amount of data bits that can be hidden in the cover medium. Security relates to the ability of an eavesdropper to figure the hidden information easily. Robustness is concerned about the resist possibility of modifying or destroying the hidden data [15] [16]. Figure 1.1: The Mechanism of Text Steganography Steganography is different than cryptography and watermarking although they all have overlapping usages in the information hiding processes [17] [22]. Steganography security hides the knowledge that there is information in the cover medium, where cryptography revels this knowledge but encodes the data as cipher-text and disputes decoding it without permission; i.e., cryptography concentrate the challenge on the decoding process while steganography adds the search of detecting if there is hidden information or not [23][24][25]. Steganography can also be utilized for posting secret communications on the Web to avoid transmission or to hide data on the network in case of a violation. It can be useful for copyright protection, which is, in reality, digital watermarking [5]. Copyright protection is to protect the cover medium from claiming its credit be others, with no real emphasis on secrecy. Text steganography also have been used since 2000 bc as a cover media. Text steganography is the most Cover Text Stego Text Embe- dding Data Embe- dding Data Embedding Extracting Stego Key