Skip to main content

2018 | OriginalPaper | Buchkapitel

Number System Oriented Text Steganography in English Language for Short Messages: A Decimal Approach

verfasst von : Kunal Kumar Mandal, Santanu Koley, Saptarshi Mondal

Erschienen in: Intelligent Computing and Information and Communication

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Information or data transfer between nodes are the necessary part of computing but the biggest need is to secure the data from evil sources. There are many technique but they are insufficient in case of information larceny. Our approach with number system oriented text steganography for short messages is the outcome for preventing such purpose. The combination of mathematical, computation rules, and knack of us hides the data from view. The approach used to hide data is innovative among data transfer protocols as word to word or rather alphabet to alphabet including numbers and special characters is derived. This approach makes data invisible when moving in any one of the ways such as SMS, WhatsApp, Email, or Facebook messenger. Good mixtures of any number, characters form a pair of sets that can be used to hide information. Security agencies like navy, army or air force can use such kind of techniques transferring data from one node to another for sake of setting aside their native soil.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat K. Tutuncu, A.A. Hassan, New approach in E-mail based text steganography, Int. J. Intell. Syst. Appl. Eng., 3 (2015), pp. 54–56. K. Tutuncu, A.A. Hassan, New approach in E-mail based text steganography, Int. J. Intell. Syst. Appl. Eng., 3 (2015), pp. 54–56.
4.
Zurück zum Zitat A.A. Mohamed, ―An Improved Algorithm for Information Hiding Based on Features of Arabic Text: A Unicode Approach‖ A Egyptian Informatics Journal 15, 79–87, 2014. A.A. Mohamed, ―An Improved Algorithm for Information Hiding Based on Features of Arabic Text: A Unicode Approach‖ A Egyptian Informatics Journal 15, 79–87, 2014.
5.
Zurück zum Zitat Staff, CACM. 2014. Know your Steganographic Enemy. Communications of the ACM, Vol. 57 No. 5, Page 8. Staff, CACM. 2014. Know your Steganographic Enemy. Communications of the ACM, Vol. 57 No. 5, Page 8.
6.
Zurück zum Zitat Kaur, S., Bansal, S., Bansal, R.K. Steganography and classification of image steganography techniques. International Conference on Computing for Sustainable Global Development (INDIACom), 2014. pp. 870–875. Kaur, S., Bansal, S., Bansal, R.K. Steganography and classification of image steganography techniques. International Conference on Computing for Sustainable Global Development (INDIACom), 2014. pp. 870–875.
7.
Zurück zum Zitat Zielińska, E., Mazurczyk, W. and Szczypiorski, K. 2014. Trends in Steganography. Communications of the ACM, Vol. 57 No. 3, Pages 86–95. Zielińska, E., Mazurczyk, W. and Szczypiorski, K. 2014. Trends in Steganography. Communications of the ACM, Vol. 57 No. 3, Pages 86–95.
8.
Zurück zum Zitat Abdelmgeid Amin Ali and Al - Hussien Seddik Saad, “New Text Steganography Technique by using Mixed-Case Font”, International Journal of Computer Applications (0975 – 8887) Volume 62– No.3, January 2013. Abdelmgeid Amin Ali and Al - Hussien Seddik Saad, “New Text Steganography Technique by using Mixed-Case Font”, International Journal of Computer Applications (0975 – 8887) Volume 62– No.3, January 2013.
9.
Zurück zum Zitat Chen, T. S. Chen, M. W. Cheng, A New Data Hiding Scheme in Binary Image, in Proc. Fifth Int. Symp. on Multimedia Software Engineering. Proceedings, pp. 88–93 (2003). Chen, T. S. Chen, M. W. Cheng, A New Data Hiding Scheme in Binary Image, in Proc. Fifth Int. Symp. on Multimedia Software Engineering. Proceedings, pp. 88–93 (2003).
10.
Zurück zum Zitat B. Feng, W. Lu and W. Sun, “Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture”, Information Forensics and Security, IEEE Transactions, vol. 10, (2015), pp. 243–255. (2001). B. Feng, W. Lu and W. Sun, “Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture”, Information Forensics and Security, IEEE Transactions, vol. 10, (2015), pp. 243–255. (2001).
11.
Zurück zum Zitat Z. Pan, X. Ma and X. Deng, “New reversible full-embeddable information hiding method for vector quantisation indices based on locally adaptive complete coding list”, Image Processing, IET, vol. 9, no. 1, (2015), pp. 22–30. Z. Pan, X. Ma and X. Deng, “New reversible full-embeddable information hiding method for vector quantisation indices based on locally adaptive complete coding list”, Image Processing, IET, vol. 9, no. 1, (2015), pp. 22–30.
12.
Zurück zum Zitat G. Doërr and J.L. Dugelay, A Guide Tour of Video Watermarking, Signal Processing: Im-age Communication, vol. 18, Issue 4, pp. 263–282, (2003). G. Doërr and J.L. Dugelay, A Guide Tour of Video Watermarking, Signal Processing: Im-age Communication, vol. 18, Issue 4, pp. 263–282, (2003).
13.
Zurück zum Zitat G. Doërr and J.L. Dugelay, Security Pitfalls of Frame by Frame Approaches to Video Wa-termarking, IEEE Transactions on Signal Processing, Supplement on Secure Media, vol. 52, Issue 10, pp. 2955–2964, (2004). G. Doërr and J.L. Dugelay, Security Pitfalls of Frame by Frame Approaches to Video Wa-termarking, IEEE Transactions on Signal Processing, Supplement on Secure Media, vol. 52, Issue 10, pp. 2955–2964, (2004).
14.
Zurück zum Zitat K. Gopalan, Audio Steganography using bit modification, Proceedings of the IEEE Inter-national Conference on Acoustics, Speech, and Signal Processing, (ICASSP ‘03), vol. 2, 6–10 April 2003, pp. 421–424, (2003). K. Gopalan, Audio Steganography using bit modification, Proceedings of the IEEE Inter-national Conference on Acoustics, Speech, and Signal Processing, (ICASSP ‘03), vol. 2, 6–10 April 2003, pp. 421–424, (2003).
15.
Zurück zum Zitat M. Nosrati, A. Hanani and R. Karimi, “Steganography in Image Segments Using Genetic Algorithm”, Advanced Computing & Communication Technologies (ACCT), (2015), pp. 102–107. M. Nosrati, A. Hanani and R. Karimi, “Steganography in Image Segments Using Genetic Algorithm”, Advanced Computing & Communication Technologies (ACCT), (2015), pp. 102–107.
16.
Zurück zum Zitat R. Aqsa, M. Muhammad, M. Saas and S. Nadwwm, “Analysis of Steganography Technique using Least Significant Bit in Graysclae Images and their ectension to Colour Images”, Journal of Scientific Research and Report, vol. 9, no. 3, (2016), pp. 1–14. R. Aqsa, M. Muhammad, M. Saas and S. Nadwwm, “Analysis of Steganography Technique using Least Significant Bit in Graysclae Images and their ectension to Colour Images”, Journal of Scientific Research and Report, vol. 9, no. 3, (2016), pp. 1–14.
17.
Zurück zum Zitat N. Provos and P. Honeyman, Hide and Seek- An introduction to Steganography, IEEE Security and Privacy, pp 32–44, May/June (2003). N. Provos and P. Honeyman, Hide and Seek- An introduction to Steganography, IEEE Security and Privacy, pp 32–44, May/June (2003).
19.
Zurück zum Zitat K. Bennett, Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text, Purdue University, CERIAS Tech. Report (2004–13). K. Bennett, Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text, Purdue University, CERIAS Tech. Report (2004–13).
20.
Zurück zum Zitat K. K. Mandal, A. Jana, V. Agarwal, A new approach of text Steganography based on ma-thematical model of number system, Circuit, Power and Computing Technologies (ICCPCT), IEEE, pp. 1737–1741, 20–21 March (2014). K. K. Mandal, A. Jana, V. Agarwal, A new approach of text Steganography based on ma-thematical model of number system, Circuit, Power and Computing Technologies (ICCPCT), IEEE, pp. 1737–1741, 20–21 March (2014).
Metadaten
Titel
Number System Oriented Text Steganography in English Language for Short Messages: A Decimal Approach
verfasst von
Kunal Kumar Mandal
Santanu Koley
Saptarshi Mondal
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7245-1_19

Premium Partner