Secure Text Steganography

被引:3
作者
Akhilandeswari, P. [1 ]
George, Jabin G. [1 ]
机构
[1] SRM Univ, Dept Comp Sci, Madras, Tamil Nadu, India
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012) | 2014年 / 216卷
关键词
Cover; Security; Interword spacing; Stego text; Capacity;
D O I
10.1007/978-81-322-1299-7_1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Steganography is an art in which the data can be hidden in other data as cover, the text files are commonly used for hiding data. The main aspects of steganography are the capacity and security, where the capacity refers to how much data can be hidden in the cover carrier, while the security concerns with the ability of disclosing or altering the data by unauthorized party. The aim of this project is to implement an algorithm to reduce the size of objects created using steganography. In addition, the security level of each approach is made more secured. This project presents an overview of text steganography and various existing text-based steganography techniques. Highlighted are some of the problems inherent in text steganography as well as issues with existing solutions. A new approach is proposed in information hiding using interword spacing which reduces the amount of information to hide. This method offers generated stego text of maximum capacity according to the length of the secret message.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 9 条
[1]  
[Anonymous], 2004, LINGUISTIC STEGANOGR
[2]  
[Anonymous], 2009, INFORM HIDING STEGAN
[3]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[4]   ELECTRONIC MARKING AND IDENTIFICATION TECHNIQUES TO DISCOURAGE DOCUMENT COPYING [J].
BRASSIL, JT ;
LOW, S ;
MAXEMCHUK, NF ;
OGORMAN, L .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1995, 13 (08) :1495-1504
[5]  
Chapman Mark, 2001, LECT NOTES COMPUTER, P156, DOI DOI 10.1007/3-540-45439-X
[6]  
JOHNSON N, STEGANOGRAPHY
[7]  
POR L.Y., 2008, 7 WSEAS INT C APPL C
[8]  
Provos N., 2003, IEEE Security & Privacy, V1, P32, DOI 10.1109/MSECP.2003.1203220
[9]  
WAYNER P, 1996, DISAPPEARING CRYPTOG