Secure Text Steganography

被引:3
|
作者
Akhilandeswari, P. [1 ]
George, Jabin G. [1 ]
机构
[1] SRM Univ, Dept Comp Sci, Madras, Tamil Nadu, India
关键词
Cover; Security; Interword spacing; Stego text; Capacity;
D O I
10.1007/978-81-322-1299-7_1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Steganography is an art in which the data can be hidden in other data as cover, the text files are commonly used for hiding data. The main aspects of steganography are the capacity and security, where the capacity refers to how much data can be hidden in the cover carrier, while the security concerns with the ability of disclosing or altering the data by unauthorized party. The aim of this project is to implement an algorithm to reduce the size of objects created using steganography. In addition, the security level of each approach is made more secured. This project presents an overview of text steganography and various existing text-based steganography techniques. Highlighted are some of the problems inherent in text steganography as well as issues with existing solutions. A new approach is proposed in information hiding using interword spacing which reduces the amount of information to hide. This method offers generated stego text of maximum capacity according to the length of the secret message.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [41] A Novel Method for Secure Image Steganography
    Anjana, S.
    Amritha, P. P.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 151 - 158
  • [42] Secure steganography in compressed video bitstreams
    Liu, Bin
    Liu, Fenlin
    Yang, Chunfang
    Sun, Yifeng
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1382 - 1387
  • [43] Steganography-Based Secure Communication
    Bhatia, Manjot
    Muttoo, Sunil Kumar
    Bhatia, M. P. S.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2012), 2014, 236 : 781 - 792
  • [44] Cover Selection for More Secure Steganography
    Esfahani, Reza
    Norozi, Zynolabedin
    Jandaghi, Gholamreza
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2018, 12 (01): : 21 - 36
  • [45] A STEGANOGRAPHY APPLICATION FOR SECURE DATA COMMUNICATION
    Baykara, Muhammet
    Das, Resul
    2013 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2013, : 309 - 313
  • [46] Puzzle based Highly Secure Steganography
    Shankar, Siva S.
    Rengarajan, A.
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [47] Secure steganography based on embedding capacity
    Sajedi, Hedieh
    Jamzad, Mansour
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (06) : 433 - 445
  • [48] SEBS - Secure Emoticons Based Steganography
    Rafat, Khan Farhan
    Hussain, Junaid
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 280 - 287
  • [49] A novel approach to secure communication in mega events through Arabic text steganography utilizing invisible Unicode characters
    Khan, Esam Ali
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [50] A novel approach to secure communication in mega events through Arabic text steganography utilizing invisible Unicode characters
    Khan, Esam Ali
    PeerJ Computer Science, 2024, 10