Novel Text Steganography through Special Code Generation (original) (raw)
Related papers
An Effective Text Steganographic Scheme Based on Multilingual Approach for Secure Data Communication
2021 Joint 10th International Conference on Informatics, Electronics & Vision (ICIEV) and 2021 5th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)
Nowadays, as communication through different internet mediums is increasing rapidly, information security is a huge concern among people of all backgrounds. Text steganography is the method of ensuring data security by concealing any secret message using cover media in such a way that no naked eyes can identify the modification of cover texts. This paper proposes a Bit-Level Embedding Technique, a variant of text steganography, to hide secret messages in the cover medium by manipulating the white spaces available in a text medium and utilizing various Latin alphabets while assuring its confidentiality not attracting suspicion from its appearance. Finally, several experiments and comparisons have been conducted to demonstrate the superiority of the proposed scheme in terms of embedding capacity, invisibility, robustness, and security that make this a standard text steganographic method. The authors propose a data hiding technique where 5-bit can be embedded per embeddable location, which is very rare in text steganography, and the utilization of multilingual forms of English alphabets gives this technique a superior performance.
A Novel Approach of Secret Message Passing Through Text Steganography
—Today's internetworking globe is full of busy roads for transferring data. Challenges on sending or receiving various kinds of hidden data, messages or information especially using this public networks. Hackers took place to leak this surreptitious data. That's the reason behind the need of a cover media where the furtive message has been hiding our information securely. Steganography, one of the popular technique for putting out of sight for a message surrounded by other media (cover) devoid of any hesitation or distrust to an additional one, which means the message will just identified by the authenticate and predetermined recipient. Using this concept a unique number system is introduced through a text message as a cover media. This paper will help the scholars as well as researchers to move towards an innovative area of research for secret message transfer.
A Novel Text Steganographic Technique Using Specific Alphabets
Journal of Computer Science, 2016
In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its...
Robust Text Steganography Algorithms for Secure Data Communications
2015
In the era of information technology, a large amount of digital information is distributed over the Internet in the form of videos, images, text, and audio. The main purpose of widespread distribution enables users to share knowledge between one another. As a result, data transmission and information sharing are effected due to malicious activities. Different techniques exist to protect user authentication, data privacy, and copyrights. Two main techniques that improve security and data protection are Cryptography and Steganography. Cryptographic algorithms convert the secret message from plain text into cipher text. Then the message is sent over the communication channel. Steganography hides a secret message inside the carrier media. This proposal will investigate different Steganography algorithms and present novel algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by applying various properties into file font format by inserting special symbols in the text file. In addition, the suggested model can be applied in both Unicode and ASCII code languages, regardless of the text file format. The proposed system achieves a high degree of the main Steganography attributes like hidden ratio, robustness, and transparency. In addition, this proposal provides guidance for other researchers in text Steganography algorithms. v ACKNOWLEDGEMENTS My thanks are wholly devoted to God who has helped me all the way to complete this work successfully. I owe a debt of gratitude to my family for understanding and encouragement.
Implementation of Improved Steganography for Hiding Text on Digital Data
International Journal of Science and Research (IJSR), 2015
Data hiding techniques have taken vital role with the hasty growth of exhaustive transfer of multimedia content and secret communications. Steganography is the art of hiding information in ways that prevent recognition. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot be able to sense the presence of contents of the hidden message. Lots of different carrier file formats can be used, but digital images are the most popular because of their occurrence on the Internet. In this, data hiding method that utilizes encoding on letters, then compression of that letters and then a new technique is proposed which is combination of two techniques. Results came from the experiment show that the proposed method can bury a large amount of secret data and also keep very high security, when the message is decrypted.
Novel Approaches to Text Steganography
Current techniques of steganography are not impervious to detection using thorough procedures. This paper proposes to ascertain security and precision in the process of Text Steganography by presenting a few unexplored techniques. It establishes reliable media to transfer any required message accompanied by hidden data. The process relies on RSA Algorithm to encrypt user data by generating subtle imperfections in the appearance or layout of the characters included in the memo. The message undergoes multilevel encryption and corresponding decryption using both the public and private keys, thus bearing invulnerability to cyber-attacks and security breaches. The receiver acquires the modified message in the sender's format, to fend off digital decryption from unauthorized users. As opposed to contemporary techniques of Text Steganography, the encrypted message has a relative constraint on the size as it depends on the size of the data to be hidden, bearing no definite restrictions on the amount of information to be conveyed.
2013
–With the rapid growth of networking mechanisms, where large amount of data can be transferred between users over different media, the necessity of secure systems to maintain data privacy increases significantly. Different techniques have been introduced to encrypt data during the transfer process to avoid any kind of attack. One of these techniques is to hide the data inside another file which is called Steganography. In steganography, data is hidden inside a carrier file where anyone can see, but the hidden data inside it cannot be discovered. To this end, good algorithms can avoid the suspicion of having any attacker by applying some criteria before sending the data. In this paper, we present an algorithm to hide data using a text file as a carrier. Left-Right Remarks that represent Unicode symbols are used to hide the data inside the text file. Moreover, our algorithm can be applied in different size textual data.
A Language Independent Platform for High Secured Communication Using Encrypted Steganography
Computer Science and Engineering, 2012
Computer usage is increasing, for both social and business areas, and it will continue to do so. This naturally leads to an increase in the way in which we as individuals and organizations we work for may be attacked.Increase of cyber-crime has compelledto rethink for a secure communication medium in our day-today life. Protecting the information during transmission is a foremostchallenge against eavesdroppers. Encryption is one of the widely used techniques that ensure the security of the message. However, sending encrypted messages often draw eavesdropper's attention. Steganography is a method of letteringsecret messages in a way that nobody except for the sender and the recipient would suspect the existence of the hidden message. In other words, it's an art/science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read.Historical steganography involved techniques such as disappearing ink or microdots. Modern steganography involves in computer files such as images, audio, video files and even in text documents. However, each stereographic technique is focused in just one medium; such as image or audio file and etc. And each steganographic algorithms had independent implementation; as a resultthere is no generic framework or application that will produce stegano medium for an end-user. In this paper, a generic framework is presented, which provides generic steganographic functionality via well-defined Application Programming Interface (API). So that the advanced developers can develop framework modules, this can be used by the end-users directly as stegangraphicapplication. And also this paper describes a newly invented steganographic technique which utilizes the inter-character spacing of a Rich-Text-Format (RTF) document. This technique can be used to transmit concealed messages in multi-language or combination of languages, which can be represented in Unicode. As an additional optimization technique; user defined code based (UDC) technique is also proposed to achieve compression of Unicode languages. Another advantage is that this technique can be used to send multi different language secret messages through the communication channel.
A New Approach to Secure Communicationwith Steganography and Cryptography
2013
In this paper we hide the message (data), using the concept of Steganography; in such a way that on-one apart from the sender and intended recipient even realizes there is a hidden message. The proposed method hides the secret message based on searching about the identical bits between the secret messages and image pixels values. The new approach is based on the LSB (Least Significant Bit) method. Also a new approach is proposed to securely sending the message using Cryptographic concept in Steganography. From the sender side the encrypted message is send and hides it in a saved picture and encodes the message. At the receiver side decryption is done to get original message.
Information Hiding: A New Approach in Text Steganography
Sending encrypted messages frequently will draw the attention of third parties, i.e. crackers and hackers, perhaps causing attempts to break and reveal the original messages. In a digital world, steganography is introduced to hide the existence of the communication by concealing a secret message inside another unsuspicious message. Steganography is often being used together with cryptography and offers an acceptable amount of privacy and security over the communication channel. This paper presents an overview of text steganography and a brief history of steganography along with various existing text-based steganography techniques. Highlighted are some of the problems inherent in text steganography as well as issues with existing solutions. A new approach is proposed in information hiding using inter-word spacing and inter-paragraph spacing as a hybrid method. Our method offers dynamic generated stego-text with six options of maximum capacity according to the length of the secret message. This paper also analyzed the significant drawbacks of each existing method and how our new approach could be recommended as a solution.