Text Steganography Based on Parallel Encryption Using Cover Text (PECT)

被引:3
作者
Panwar, Subhash [1 ]
Kumar, Mukesh [2 ]
Sharma, Sakshi [2 ]
机构
[1] Govt Engn Coll, Dept IT, Bikaner 334004, India
[2] Govt Engn Coll, Dept CSE, Bikaner 334004, India
来源
4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES | 2020年 / 1122卷
关键词
Internet of Things; Complexity; Hiding; Text Steganography; Plain text; Cover text; Encryption; Parallelism; Self-checking;
D O I
10.1007/978-3-030-39875-0_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a self-checking text steganography which could be used efficiently where large data is involved in various IoT applications. The space complexity of its cover text is one-fourth of its message size which is very less as compared to other techniques. The cover text of this method is generated from the private message itself. Later it is used to check the correctness of the data on receiver side. This helps to reduce the time overhead in case of corruption of any part of the data. Thus, the security and trust issues of IoT are easily handled even on high traffic channels.
引用
收藏
页码:303 / 313
页数:11
相关论文
共 12 条
  • [1] Agarwal M., 2013, INT J NETWORK SECURI, V5, P91
  • [2] Changder S., 2010, 2010 COMP TECHN DEV
  • [3] Chaudhary S., 2013, C ADV COMM CONTR SYS
  • [4] Gaur M., 2015, International Journal on Recent and Innovation Trends in Computing and Communication, V3, P1344
  • [5] Kataria S., 2013, PDAC PARALLEL ENCRYP
  • [6] Kataria S., 2013, 4 INT JOINT C ADV EN, V6, P155
  • [7] Kataria S, 2013, 2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), P612, DOI 10.1109/ICIIP.2013.6707666
  • [8] A Novel Text Steganography System Using Font Color of the Invisible Characters in Microsoft Word Documents
    Khairullah, Md.
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 482 - 484
  • [9] Lingyun Xiang, 2007, 2007 3rd International Symposium on Information Assurance and Security, P490
  • [10] Shirali-Shahreza Mohammad, 2007, 2007 International Conference on Convergence Information Technology - ICCIT '07, P2260, DOI 10.1109/ICCIT.2007.100