Aggrandize Text Security and Hiding Data through Text Steganography

被引:0
作者
Chaudhary, Sunita [1 ]
Dave, Meenu [2 ]
Sanghi, Amith [3 ]
机构
[1] Jagannath Univ, Dept Comp Sci & IT, Jaipur, Rajasthan, India
[2] Jagan Nath Univ, Dept Comp Sci & IT, Jaipur, Rajasthan, India
[3] Marudhar Engn Coll, Dept Comp Sci & Engn, Bikaner, India
来源
2016 IEEE 7TH POWER INDIA INTERNATIONAL CONFERENCE (PIICON) | 2016年
关键词
Text; Steganography; CASE; ISET; Random; Cover Text;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography is the technique of cover up information in another media and protects it from prying eyes. Modern Steganography intends to hide the data in a cover media such as text, digital images, video, audio, to exchange secret message. Communication parties rely on the change in the structure and features of the cover media in such a manner as is not identifiable by prying eyes. However, using the text as the cover medium is relatively difficult as compared to the other cover media. This difficulty is observed because of the lack of redundant information in a text file, as compared to an image, video or a sound clip which contains much redundancy that is exploited by the steganography algorithms. In this paper, we present and evaluate our contribution to design two new approaches for text Steganography and named them as CASE (Capital Alphabet Shape Encoding) and ISET (Indian Script Encoding Technique). These methods are combination of the random character sequence and feature coding method. Here we take two processes in these text steganography approaches. Firstly encode all the characters of the secret message with a new encoding technique base on the classification of the Hindi characters or English characters. Second hide the message in the randomly generated cover text. CASE and ISET reduces the memory consumption and size of cover text used for steganography. In these methods, one letter can hide maximum of eight bits which improves time overhead and memory overhead.
引用
收藏
页数:5
相关论文
共 16 条
  • [1] ALLA K, 2009, INF TECHN NEW GEN 6, P1577
  • [2] Alla K., 2009, 6 INT C INF TECHN
  • [3] Alla Kalavathi., 2008, IJCSNS INT J COMPUTE, V8
  • [4] [Anonymous], 2004, LINGUISTIC STEGANOGR
  • [5] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [6] Changder S., 2010, 2nd International Conference on Computer Technology and Development (ICCTD 2010), P318, DOI 10.1109/ICCTD.2010.5645862
  • [7] chaudhary Sunita, 2013, C ADV COMM CONTR SYS, P120
  • [8] Chaudhary Sunita, 2016, 2 INT C INF COMM TEC
  • [9] Dulera S., 2012, INT J NETWORK SECURI, V3, P213, DOI 10.5121/ijnsa.2011.3616
  • [10] Dunbar B., 2002, DETAILED LOOK STEGAN