Disbursal of Text Steganography in the Space of Double-Secure Algorithm

被引:1
|
作者
Khan, Yahya [1 ]
Algarni, Ali [2 ]
Fayomi, Aisha [2 ]
Almarashi, Abdullah M. [2 ]
机构
[1] Univ Sci & Technol China, Sch Informat Sci & Technol, Dept Elect Engn & Informat Sci, Hefei, Peoples R China
[2] King Abdulaziz Univ, Fac Sci, Dept Stat, Jeddah, Saudi Arabia
关键词
D O I
10.1155/2021/7336474
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Hackers reveal sensitive information from encrypted conversations as the globe has become one community. As a result, steganography and cryptography are used together to safeguard sensitive data more effectively than previous approaches and newly developed algorithms. A double-secure algorithm for text steganography (DSTS) is the safest approach compared to the paragraph hiding method (PHM) and capital alphabet shape encoding (CASE) method. In this context, the paragraph hiding method uses ASCII coding, which is not a standard method, and the CASE method has a security issue that if someone understands its applicability, it can be easily attacked. DSTS algorithm overcomes its limitations by using UTF-16 coding and enhances the security of CASE with a one-time pad (OTP).) The one-time pad is a theoretically unbreakable cryptographic method. Still, it is not feasible for long messages, however, it is usable for short messages such as a password or intelligence agency's more secure messages. DSTS degrades the average hiding capacity in a PHM from 2.06% to 1% due to UTF-16 coding. Using the UTF-8 method, the authors have improved MDSTS and the CMPHM by 6.49% and 7.76% hiding capacity, which outperforms in existing procedures; in the CMPHM, there is one reason for the improvement in hiding capacity is using the LZW compression method. CMHPM algorithm optimization standard deviation is less than that of the HPM, DSTS, and MDSTS, ultimately increasing speed.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Secure Text Steganography
    Akhilandeswari, P.
    George, Jabin G.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 : 1 - 7
  • [2] Research on the algorithm of text steganography
    Niu, Xin-Xin
    Yang, Yi-Xian
    2003, Chinese Institute of Electronics (31):
  • [3] Secure Digital Steganography for ASCII Text Documents
    Khan Farhan Rafat
    M. Sher
    Arabian Journal for Science and Engineering, 2013, 38 : 2079 - 2094
  • [4] Secure Digital Steganography for ASCII Text Documents
    Rafat, Khan Farhan
    Sher, M.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08) : 2079 - 2094
  • [5] A secure controlled quantum image steganography algorithm
    Zhiguo Qu
    Siyi Chen
    Xiaojun Wang
    Quantum Information Processing, 2020, 19
  • [6] A secure steganography method based on genetic algorithm
    Wang, Shen
    Yang, Bian
    Niu, Xiamu
    Journal of Information Hiding and Multimedia Signal Processing, 2010, 1 (01): : 28 - 35
  • [7] Dual Layered Secure Algorithm for Image Steganography
    Gowda, Shreyank N.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 22 - 24
  • [8] A secure controlled quantum image steganography algorithm
    Qu, Zhiguo
    Chen, Siyi
    Wang, Xiaojun
    QUANTUM INFORMATION PROCESSING, 2020, 19 (10)
  • [9] Genetic Algorithm Based Model in Text Steganography
    Mulunda, Christine K.
    Wagacha, Peter W.
    Adede, Alfayo O.
    AFRICAN JOURNAL OF INFORMATION SYSTEMS, 2013, 5 (04):
  • [10] SECURE AND HIDDEN TEXT USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY
    Abood, May Hattim
    Taha, Zahraa Khudhair
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2019, 14 (03) : 1434 - 1450