Disbursal of Text Steganography in the Space of Double-Secure Algorithm

被引:1
|
作者
Khan, Yahya [1 ]
Algarni, Ali [2 ]
Fayomi, Aisha [2 ]
Almarashi, Abdullah M. [2 ]
机构
[1] Univ Sci & Technol China, Sch Informat Sci & Technol, Dept Elect Engn & Informat Sci, Hefei, Peoples R China
[2] King Abdulaziz Univ, Fac Sci, Dept Stat, Jeddah, Saudi Arabia
关键词
D O I
10.1155/2021/7336474
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Hackers reveal sensitive information from encrypted conversations as the globe has become one community. As a result, steganography and cryptography are used together to safeguard sensitive data more effectively than previous approaches and newly developed algorithms. A double-secure algorithm for text steganography (DSTS) is the safest approach compared to the paragraph hiding method (PHM) and capital alphabet shape encoding (CASE) method. In this context, the paragraph hiding method uses ASCII coding, which is not a standard method, and the CASE method has a security issue that if someone understands its applicability, it can be easily attacked. DSTS algorithm overcomes its limitations by using UTF-16 coding and enhances the security of CASE with a one-time pad (OTP).) The one-time pad is a theoretically unbreakable cryptographic method. Still, it is not feasible for long messages, however, it is usable for short messages such as a password or intelligence agency's more secure messages. DSTS degrades the average hiding capacity in a PHM from 2.06% to 1% due to UTF-16 coding. Using the UTF-8 method, the authors have improved MDSTS and the CMPHM by 6.49% and 7.76% hiding capacity, which outperforms in existing procedures; in the CMPHM, there is one reason for the improvement in hiding capacity is using the LZW compression method. CMHPM algorithm optimization standard deviation is less than that of the HPM, DSTS, and MDSTS, ultimately increasing speed.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] AH4S: an algorithm of text in text steganography using the structure of omega network
    Hamdan, Abdullah M.
    Hamarsheh, Ala
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6004 - 6016
  • [32] Video Steganography for Image and Text Using Deep Genetic Algorithm and LSB
    Selim, Nouran Mohamed
    Guirguis, Shawkat Kamal
    Hassan, Yasser Fouad
    International Journal of Network Security, 2022, 24 (01) : 140 - 146
  • [33] Highly Secure Image Steganography Algorithm using Curvelet Transform and DCT Encryption
    ElSayed, Ahmed
    Elleithy, Abdelrahman
    Thunga, Prasanthi
    Wu, Zhengping
    2015 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2015,
  • [34] Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses
    Alanazi, Norah
    Khan, Esam
    Gutub, Adnan
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2020, 34 (04) : 1343 - 1356
  • [35] CNN based "Text in Image" Steganography using Slice Encryption Algorithm and LWT
    Srinivasu, Lingamallu Naga
    Veeramani, Vijayaraghavan
    OPTIK, 2022, 265
  • [36] Text steganography system using Markov chain source model and DES algorithm
    Dai W.
    Yu Y.
    Dai Y.
    Deng B.
    Journal of Software, 2010, 5 (07) : 785 - 792
  • [37] Secure non real time image encryption algorithm development using cryptography & Steganography
    Mukhedkar, Moresh
    Powar, Prajkta
    Gaikwad, Peter
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [38] A secure image steganography algorithm based on least significant bit and integer wavelet transform
    Elshazly, Emad
    Abdelwahab, Safey
    Abouzaid, Refaat
    Zahran, Osama
    Elaraby, Sayed
    Elkordy, Mohamed
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2018, 29 (03) : 639 - 649
  • [39] AES-Based Steganography Using Blockchain: A Novel Approach for Secure Text Hiding in Encrypted Images
    Salim, Batool Arif
    Aljabery, Maalim A.
    Younis, Hameed Abdulkareem
    Informatica (Slovenia), 2024, 48 (21): : 67 - 78
  • [40] A secure image protection algorithm by steganography and encryption using the 2D-TSCC
    李琦
    王兴元
    王赫
    叶晓林
    周双
    高锁
    施云庆
    Chinese Physics B, 2021, 30 (11) : 149 - 160