New robust and secure alphabet pairing Text Steganography Algorithm

نویسنده

  • Kamaljit Lakhtaria
چکیده

Steganography has been practiced since ancient times. Many Linguistic Steganography (popularly known as Text based Steganography) algorithms have been proposed like Word Spacing, Substitution, Adjectives, Text Rotation, Mixed Case Font etc.. Information Hiding effectively means that the method/technique should be Robust, Secure and have good Embedding capacity. Measure of Similarity between cover text i.e. original text or message and Stego text through Jaro Winkler distance gives an indication of whether the Stego text can actually embed the text. The proposed algorithm consists of embedding the secret text in the original message by pairing the secret message alphabet into 4 parts of 2 bits each. The last word of the original message will consist of the position of the secret message alphabets in its ASCII equivalent. Decryption steps consist of decoding the position of the secret message in the original message and extraction by the pairing method so that the secret message can be found. Jaro Winkler Distance is 1 as there is no extra substitution in the original message except the last word showing the position which becomes part of the message and cannot be detected making it secure. Keywords—Linguistic Steganography, Information Hiding, Decryption,Secure, Size, Robust, Embedding capacity, Pairing of bits, Stego text, ASCII, Original message, Secret message , Jaro Winkler Distance, Substitution.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Patch-Based Digital Signature

In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...

متن کامل

Improved Hash Based Approach for Secure Color Image Steganography using Canny Edge Detection Method

In this paper, we proposed a hash based approach for color image steganography using canny edge detection method. One of the advantages of using edge detection technique is to secure our data. Proposed methodology follows encoding and decoding procedure. For encoding the data in an image we follow a steganography procedure. Steganography is the art of hiding information like-text, audio, video ...

متن کامل

Steganography Based on Chaotic Torus Automorphisms

Secure transmission of information is one of the big challenges of knowledge society. Steganography is the transmission of secret messages embedded within other covering messages which conceal the existence of underlying messages (steganosis). In cryptography however, the presence of secret messages is known. We develop a new Steganography method based on Chaos, for concealing texts or images e...

متن کامل

High capacity steganography tool for Arabic text using 'Kashida'

Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...

متن کامل

A Secure Data Communication System Using Cryptography and Steganography

ABSTRACT The information security has become one of the most significant problems in data communication. So it becomes an inseparable part of data communication. In order to address this problem, cryptography and steganography can be combined. This paper proposes a secure communication system. It employs cryptographic algorithm together with steganography. The jointing of these techniques prov...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016