A classical approach for hiding encryption key in the same encrypted text document (original) (raw)

An Effective Text Steganographic Scheme Based on Multilingual Approach for Secure Data Communication

2021 Joint 10th International Conference on Informatics, Electronics & Vision (ICIEV) and 2021 5th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)

Nowadays, as communication through different internet mediums is increasing rapidly, information security is a huge concern among people of all backgrounds. Text steganography is the method of ensuring data security by concealing any secret message using cover media in such a way that no naked eyes can identify the modification of cover texts. This paper proposes a Bit-Level Embedding Technique, a variant of text steganography, to hide secret messages in the cover medium by manipulating the white spaces available in a text medium and utilizing various Latin alphabets while assuring its confidentiality not attracting suspicion from its appearance. Finally, several experiments and comparisons have been conducted to demonstrate the superiority of the proposed scheme in terms of embedding capacity, invisibility, robustness, and security that make this a standard text steganographic method. The authors propose a data hiding technique where 5-bit can be embedded per embeddable location, which is very rare in text steganography, and the utilization of multilingual forms of English alphabets gives this technique a superior performance.

Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptography and Text Steganography

Steganography and cryptography are main tools for secure the information. The integration of steganography with cryptography to secure communication, is an application that integrate Steganography techniques with Cryptography techniques to get more secure communication method. This paper aim to design a system with more sturdy security, by hybrid AES cryptography and text steganography. In this paper we proposed a method that encrypt secret message and then embedding it in cover text. This done by scrambled secret message first through AES encryption algorithm then hiding it into Arabic cover text. This paper also study the efficient embedding technique that can be used for hiding the encrypted data in cover text to hide it from attackers and sent message to the receiver in a safe mode.

A Novel Text Steganographic Technique Using Specific Alphabets

Journal of Computer Science, 2016

In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its...

UNLIMITED SIZE OF ENGLISH PLAIN TEXT-IN-TEXT HIDING ALGORITHM

ABSRACT When using internet as main communication infrastructure, people apart need their information to be protected from other third parties. Two widely techniques are used for it, cryptography and steganography. In cryptography the existence of the encrypted message is visible to the world. While steganography conceals the very existence of the message. This paper concerns with steganography. It deals with text-in-text data hiding technique. The method of using non-printable characters of the Unicode standard characters are chosen to encode and hide English text into another English cover text to produce a stego text that can be used later, at the other end of the communication media, to extract and recover the exact secret text. Two text-in-text and text-from-text hiding and extraction algorithms are written and coded in matlab programming language. Merits and drawbacks are shown for the proposed algorithms. The designed algorithms result in adding many enhancements to the implementation of the basic method of using the non-printable characters of the Unicode standard characters to text-in-text hiding technique. These enhancements include the size minimization of stego text file, reducing of hiding and extraction processing time and thus reducing communication time. From security point of view, key has been used to encrypt the secret text before hiding it and decrypt the text at the extraction stage. INTRODUCTION Today, internet becomes as a key communication infrastructure for connecting peoples across the global. And hence, secure communications for both social and business fields through public and private channels become as more important issue. As this communication happened and developed into everyday activity, securing sensitive data became as a matter of great concern [1,2]. In many situations, people apart need their information to be protected from other third parties. Two widely used techniques are used, cryptography and steganography. Cryptography is the study of changing information appearance by scrambling secret data and keeping them overt. It is used when communicating over an untrusted medium such as internet [3]. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and the receiver would realize that a secret communicating is taking place [4]. In cryptography the existence of the encrypted message is visible to the world. While steganography conceals the very existence of the message, and removes the unwanted attention coming to the hidden message. Cryptographic methods try to protect the content of a message, while steganography uses methods that would hide both the message as well as the

Securing Data via Cryptography and Arabic Text Steganography

SN Computer Science

This research proposes an efficient security system for hiding classified Arabic text-data on limited processors devices benefiting from the combination of both techniques: lightweight cryptography (LWC) and Arabic text steganography. The work assumes to secure the sensitive text-data on devices suffering low resource allocation by layer of LWC encryption to provide acceptable security. In this work, we use a two-layer technique, where we firstly encrypt the Arabic secret text-data examining effectiveness of different LWC algorithms, i.e. AES, DES, and IDEA; then, embedding the encrypted data into diacritics within Arabic text cover media. The work tested the possibility of accepting LWC security of AES, IDEA, and DES encryption assuming their suitable effect on the text stego-cover. The work runs numerous different experimentations to study the preference, where LWC selection of DES algorithm finds the applicable scheme giving acceptable security in efficient manner.

Transmitting Security Enforcement By Text Encrypting and Image Hiding Technique using Combined Encrypt/Hide Keys

International Journal of Engineering and Manufacturing, 2018

Comparative study of cryptography and steganography techniques shows that they have some strong and weak points when they used alone. But as we know from soft computing techniques (neural, genetic, and fuzzy computing), that when combining (hybridizing), more than one techniques, by the suitable way to do a job, the outcome will be a better technique with more strong points and less weak points. Work of this paper represents an attempt to prove that combining cryptography with steganography techniques will result in hard transmitting system to break and thus enforcing security issues of secret text data transmitting over public channels. Matlab programs are written to encrypt plain text secret information following AES encrypt/decrypt algorithm with a key of 128 bits long and then hide/extract the text according to LSB insertion method with a key of 128 bits long too. System tests show that both techniques enforce each other and private data transmitting become more secure.

Novel Text Steganography through Special Code Generation

2011

Encrypted messages sending frequently draws the attention of third parties, perhaps causing attempts to break and reveal the original messages. Steganography is introduced to hide the existence of the communication by concealing a secret message in an appropriate carrier like text, image, audio or video. Steganography is of Greek origin and means "Covered or hidden writing". The carrier can be sent to a receiver without any one except the authenticated receiver only knows existence of the information. Steganography is often being used together with cryptography and offers an acceptable amount of privacy and security over the communication channel. It is an emerging area which is used for secured data transmission over any public media. In this paper, a novel text based steganography technique based on the use of indefinite articles 'a' or 'an' in conjunction with the non-specific or non-particular nouns in English language have been proposed. The authors also introduced a new code representation technique (SSCE -Secret Steganography Code for Embedding) at both ends in order to achieve high level of security. Before the embedding operation each character of the secret message has been converted to SSCE Value and then embeds to cover text. Finally stego text is formed and transmits to the receiver side. At the receiver side different reverse operation has been carried out to get back the original information.

A novel approach to secret data concealment with high cover text capacity and security

International Journal of Electronic Security and Digital Forensics, 2020

Massive technological advancement and rapid internet growth has made the security of secret data more challenging for security researchers. Though, steganography techniques were also evolved but still require large cover text to conceal large message. Therefore, to deal capacity issue, present research articulates a novel approach to achieve high data concealment capacity of cover text along with security by using combination of steganography and cryptography. Current algorithm applies four-layer encryption on secret message and seven Unicode characters such as invisible plus (IP), invisible separator (IS), inhabit symmetric swapping (ISS), left to right override (LRO), (ZWNJ), zero width joiner (ZWJ), zero width non-joiner and zero width character (ZWC), are employed to embed secret information into English carrier text to generate stego text object. The result reflects tremendous increase of 300% in carrier text capacity and encryption significantly enhances the security of secret information. Moreover, the identical carrier and stego text reduces hacker's attention.

A cryptographic data hiding algorithm with high cover text capacity

International Journal of Electronic Security and Digital Forensics, 2019

Cryptography and steganography are foremost techniques used to ensure security and confidentiality of secret information. In steganography, data hiding capacity with security is a great challenge for the researchers. In present scheme, a novel approach with combination of steganography and cryptography is proposed to achieve high data hiding capacity with greater security. To accomplish this goal, three level encryption is applied to hide secret message by using bit complement and bit right rotation. Different Unicode characters such as zero width non-joiner (ZWNJ), zero width joiner (ZWJ) and zero width character (ZWC), are used to conceal secret information into English cover text. To embed secret data into cover text, firstly, algorithm implements three level encryption on confidential data and then resulting binary is embedded into cover text by using Unicode characters. The results revealed that recently designed algorithm has higher data security due to light

A Secure Method to Hide Confidential Data Using Cryptography and Steganography

2016

The rate at which encrypted messages are being sent over the internet and other electronic means will easily capture the attention of hackers and possibly make them try to disrupt or even hack those messages so as view the original message. Steganography is designed to hide the presence of a message by hiding the secret message inside an innocent file. For effective security, steganography is sometimes combined with cryptography. In this paper, steganography and cryptography are combined to provide a robust system capable of encrypting a secret message using RSA algorithm. To hide the message, advanced LSB method is used. The original message is encrypted at the initial stage and then separated into two portions P1 and P2. An XOR operation is applied to the first portion (P1) using the odd location and to the second portion (P2) using the even position of the LSB+1.The Position of the LSB is then used to hide the XORed encrypted message. Keywords-cryptography; RSA algorithm; stegano...