Czech Text Steganography Method by Selective Hiding Technique

被引:0
|
作者
Khan, Sungkrityayan [1 ]
Sankineni, Rishi [1 ,2 ]
Balagurunathan, Padmavathi [3 ]
Shree, Nujerlla Suresh Divya [1 ,2 ]
Balasubramanian, Abinaya [1 ,2 ]
机构
[1] SRM Univ, Madras, Tamil Nadu, India
[2] SRM Univ, Dept Comp Sci, Madras, Tamil Nadu, India
[3] SRM Univ, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
关键词
Czech Text; Text Steganography; Information Security; Cryptography; Text watermarking; Feature coding;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper we have presented a novel approach of steganography which is suitable for Czech texts. The approach can be assorted under selective hiding method of text steganography. This approach involves the concealing of the information bits clandestinely within the letters gaining from their inherited points. To ascertain the specific letters holding the secluded bits, the propounded technique considers the two features, the redundant Czech extension characters and the extensions of the points in the letters. The un-pointed letters with extension are used by us to hold the secluded bit 'zero' and the pointed letters having an extension to hold the 'one' bit. This specific steganography technique is found similar to other languages having alike text to Czech such as Esperanto, Vietnamese etc.
引用
收藏
页码:482 / 485
页数:4
相关论文
共 50 条
  • [1] A New Steganography Method for Hiding Text into RGB Image
    Ibrahim, AL-Hasan Amer
    Anooz, Ruaa Shallal Abbas
    Abdulkareem, Mohammed Ghassan
    Albadr, Musatafa Abbas Abbood
    AL-Dhief, Fahad Taha
    Hussein, Yaqdhan Mahmood
    Hanoosh, Hatem Oday
    Mutar, Mohammed Hasan
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 867 - 876
  • [2] Dual Steganography for Hiding Text in Video by Linked List Method
    Selvigrija, P.
    Ramya, E.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICETECH), 2015, : 20 - 24
  • [3] Hindi text steganography - An approach to information hiding
    Changder, S.
    Debnath, N. C.
    Ghosh, D.
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2010, 10 (1-2 SUPPL. 1) : S85 - S96
  • [4] Information hiding: A new approach in text steganography
    Por, L. Y.
    Delina, B.
    [J]. WSEAS: ADVANCES ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE, 2008, : 689 - +
  • [5] Aggrandize Text Security and Hiding Data through Text Steganography
    Chaudhary, Sunita
    Dave, Meenu
    Sanghi, Amith
    [J]. 2016 IEEE 7TH POWER INDIA INTERNATIONAL CONFERENCE (PIICON), 2016,
  • [6] High Hiding Capacity Steganography Method Based On Pixel Indicator Technique
    Rahmani, Vahid
    MohammadPour, Mostafa
    [J]. 2017 5TH IRANIAN JOINT CONGRESS ON FUZZY AND INTELLIGENT SYSTEMS (CFIS), 2017, : 144 - 149
  • [7] Ternary Data Hiding Technique for JPEG Steganography
    Sachnev, Vasily
    Kim, Hyoung-Joong
    [J]. DIGITAL WATERMARKING, 2011, 6526 : 202 - 210
  • [8] Data Hiding on Social Media Communications Using Text Steganography
    Shiu, Hung-Jr
    Lin, Bor-Shing
    Lin, Bor-Shyh
    Huang, Po-Yang
    Huang, Chien-Hung
    Lei, Chin-Laung
    [J]. RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2017, 2018, 10694 : 217 - 224
  • [9] Lossless Steganography: An Approach for Hiding Text under Image Cover
    Nandi, Biswarup
    Ghanti, Mousumi
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 436 - 441
  • [10] A Novel Approach of Bulk Data Hiding using Text Steganography
    Shivani
    Yadav, Virendra Kumar
    Batham, Saumya
    [J]. 3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 1401 - 1410