Disbursal of Text Steganography in the Space of Double-Secure Algorithm

被引:1
|
作者
Khan, Yahya [1 ]
Algarni, Ali [2 ]
Fayomi, Aisha [2 ]
Almarashi, Abdullah M. [2 ]
机构
[1] Univ Sci & Technol China, Sch Informat Sci & Technol, Dept Elect Engn & Informat Sci, Hefei, Peoples R China
[2] King Abdulaziz Univ, Fac Sci, Dept Stat, Jeddah, Saudi Arabia
关键词
D O I
10.1155/2021/7336474
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Hackers reveal sensitive information from encrypted conversations as the globe has become one community. As a result, steganography and cryptography are used together to safeguard sensitive data more effectively than previous approaches and newly developed algorithms. A double-secure algorithm for text steganography (DSTS) is the safest approach compared to the paragraph hiding method (PHM) and capital alphabet shape encoding (CASE) method. In this context, the paragraph hiding method uses ASCII coding, which is not a standard method, and the CASE method has a security issue that if someone understands its applicability, it can be easily attacked. DSTS algorithm overcomes its limitations by using UTF-16 coding and enhances the security of CASE with a one-time pad (OTP).) The one-time pad is a theoretically unbreakable cryptographic method. Still, it is not feasible for long messages, however, it is usable for short messages such as a password or intelligence agency's more secure messages. DSTS degrades the average hiding capacity in a PHM from 2.06% to 1% due to UTF-16 coding. Using the UTF-8 method, the authors have improved MDSTS and the CMPHM by 6.49% and 7.76% hiding capacity, which outperforms in existing procedures; in the CMPHM, there is one reason for the improvement in hiding capacity is using the LZW compression method. CMHPM algorithm optimization standard deviation is less than that of the HPM, DSTS, and MDSTS, ultimately increasing speed.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generator
    Shah, Pratik D.
    Bichkar, R. S.
    INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND APPLICATIONS, ICICA 2016, 2018, 632 : 119 - 129
  • [42] A secure image steganography algorithm based on least significant bit and integer wavelet transform
    ELSHAZLY Emad
    ABDELWAHAB Safey
    ABOUZAID Refaat
    ZAHRAN Osama
    ELARABY Sayed
    ELKORDY Mohamed
    Journal of Systems Engineering and Electronics, 2018, 29 (03) : 639 - 649
  • [43] A secure image protection algorithm by steganography and encryption using the 2D-TSCC*
    Li, Qi
    Wang, Xingyuan
    Wang, He
    Ye, Xiaolin
    Zhou, Shuang
    Gao, Suo
    Shi, Yunqing
    CHINESE PHYSICS B, 2021, 30 (11)
  • [44] Double transductive inference algorithm for text classification
    Liu, Yihong
    Teng, Guifa
    Ma, Jianbin
    Yang, Duanli
    Wang, Fang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2007, 3 (6A): : 1463 - 1469
  • [45] Text steganography: a novel character-level embedding algorithm using font attribute
    Ramakrishnan, Bala Krishnan
    Thandra, Prasanth Kumar
    Srinivasula, A. V. Satya Murty
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6066 - 6079
  • [46] Double Chaining Algorithm A Secure Symmetric-key Encryption Algorithm
    Kurniawan, Daniar Heri
    Munir, Rinaldi
    2016 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATICS - CONCEPTS, THEORY AND APPLICATION (ICAICTA), 2016,
  • [47] Steganography in Color Animated Image Sequence for Secret Data Sharing Using Secure Hash Algorithm
    Basak, Ratan Kumar
    Chatterjee, Ritam
    Dutta, Paramartha
    Dasgupta, Kousik
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (02) : 1891 - 1920
  • [48] A novel approach to secure communication in mega events through Arabic text steganography utilizing invisible Unicode characters
    Khan, Esam Ali
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [49] A Double Layered Additive Space Sequenced Audio Steganography Technique for Mobile Network
    Ghosh, Saswati
    De, Debashis
    Kandar, Debdatta
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 29 - 33
  • [50] Steganography in Color Animated Image Sequence for Secret Data Sharing Using Secure Hash Algorithm
    Ratan Kumar Basak
    Ritam Chatterjee
    Paramartha Dutta
    Kousik Dasgupta
    Wireless Personal Communications, 2022, 122 : 1891 - 1920