A Proposed Algorithm for Text in Image Steganography based on Character Pairing and Positioning

نویسندگان

  • Nitin Kaul
  • Mrinal Chandra
  • Jessica Fridrich
  • Miroslav Goljan
  • Dorin Hogea
  • R. J. Qureshi
  • Hedieh Sajedi
  • Mansour Jamzad
چکیده

In a very less time internet has got heights. In every organization internet is the main employee without which the organization will doom. Most of the work is done, saved, edited online. With this such well-developed backbone, one important issue arises, and that is cybercrime. If communication is done online, that means data is being transferred, and security of that data is important. For this Cryptography and steganography plays a very important role. Number of algorithms are working to maintain the security one of which is steganography using image. The major problem with it is that on hiding large amount of data the image get distorted, to solve this issue we propose the idea of finding the data in the image rather than hiding it. In this paper an algorithm has been proposed to increase the capacity of data to be hidden. The proposed algorithm works on the bit level and is specifically text in image steganography. The main part of the algorithm is the key generated after searching text in image. The key will be position matrix where the text will be hidden. This algorithm will help to increase the size of data to be hidden.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

متن کامل

Optimizing image steganography by combining the GA and ICA

In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...

متن کامل

High capacity steganography tool for Arabic text using 'Kashida'

Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...

متن کامل

A High Capacity Email Steganography Scheme using Dictionary

The main objective of steganography is to conceal a secret message within a cover-media in such a way that only the original receiver can discern the presence of the hidden message. The cover-media can be a text, email, audio, image, and video, which can be transmitted through a public channel, such as the Internet. By extending the use of email among Internet users, the provision of email steg...

متن کامل

A New Hybrid Method for Colored Image Steganography Based On DWT

Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015