Unified Inter-Letter Steganographic Algorithm, A Text-based Data Hiding Method

被引:0
作者
Esmaeilkhah, Ahmad [1 ]
Ghobadi, Changiz [1 ]
Nourinia, Javad [1 ]
Majidzadeh, Maryam [2 ]
机构
[1] Urmia Univ, Elect Engn Dept, Orumiyeh, Iran
[2] Tech & Vocat Univ, Dept Elect & Comp Engn, Orumiyeh, Iran
关键词
Steganography; UILS; InLetSteg; Reverse extraction attack; Unicode space character; Inter-letter spacing; INFORMATION;
D O I
10.34028/iajit/17/6/1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper funds a novel text-based steganographic algorithm with enhanced functionality with respect to the previously proposed methods, by careful selection of one of standard space characters, the introduced Inter-Letter Steganographic Method, or Visual and Reverse Extraction attacks, two additional modes of operation have been added to the original InLetSteg algorithm and have been merged into a single one, called as Unified Inter-Letter Steganographic Method, or UILS. The Unified Inter-Letter Steganographic Method (UILS) embeds the data using variable step-size into the host text and the developed mathematical model can calculate the approximate length of the host text required to embed certain data, statistically. In addition, the general mathematical model of UILS makes it customizable to adapt the real-world applications. The statistical parameters that are used through this work are calculated for English host text, but are easily calculable for other languages with similar alphabets and structure of notations. Finally, the programmatically deployed UILS outputs are experimentally examined using 60 attendant and the results are discussed.
引用
收藏
页码:833 / 838
页数:6
相关论文
共 23 条
  • [1] [Anonymous], 1992, The Histories
  • [2] [Anonymous], 1999, INFORM HIDING TECHNI
  • [3] [Anonymous], 2011, UN STAND VERS 6 1 GE
  • [4] Bailer W., WBSTEGO STEGANOGRAPH
  • [5] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [6] Culnane C, 2006, LECT NOTES COMPUT SC, V4283, P96
  • [7] Hamad N, 2010, INT ARAB J INF TECHN, V7, P146
  • [8] Steganography in games: A general methodology and its application to the game of Go
    Hernandez-Castro, JC
    Blasco-Lopez, I
    Estevez-Tapiador, JM
    Ribagorda-Garnacho, A
    [J]. COMPUTERS & SECURITY, 2006, 25 (01) : 64 - 71
  • [9] Hossain M, 2010, INT ARAB J INF TECHN, V7, P34
  • [10] Kessler GC., 2014, FORENSIC SCI COMMUN, V6, P1