Indiscernible Communication through ASCII Text Document/File (Communication in Veil)
نویسنده
چکیده
Internet has embarked comforting impact on people’s lives across the globe as personal tasks such as cash transactions, mails, fax, data storage or retrieval etc. are now preferably being done electronically using personal computers/cell phones/TABs etc. This, however, has also elevated issues vis-à-vis availability, legitimacy, and renunciation of information causing discomfort in information security field because the number of cases including copyright infringement, heavy financial loss on account of e-theft of credit cards, impersonation through hacking of social IDs etc. are on increase, and calls for their immediate remedy. Steganography – the art and science of oblivious communication – has emerged as an exciting research area for expert and naïve academics now days to mitigate aforesaid security issues and is the prima facie of our research that focuses on evolving secure ASCII text-cover centric data hiding scheme for stealth communication.
منابع مشابه
Communication in Veil: Enhanced Paradigm for ASCII Text Files
Digitization has a persuasive impact on information and communication technology (ICT) field which can be realized from the fact that today one seldom think to stand in long awaiting queue just to deposit utility bills, buy movie ticket, or dispatch private letters via post office etc. as these and other such similar activities are now preferably being done electronically over internet which ha...
متن کاملA new approach to covert communication via PDF files
A new covert communication method via PDF files is proposed. A secret message, after being encoded by a special ASCII code and embedded at between-word and betweencharacter locations in the text of a PDF file, becomes invisible in the window of a common PDF reader, creating a steganographic effect for secret transmission through the PDF file. Experimental results show the feasibility of the pro...
متن کاملHow to Hand It In
WHAT TO HAND IN 1. A document (word 2003, ascii text and adobe acrobat are acceptable formats) containing answers to the homework questions 1 through 3. 2. TWO Paper reviews. EACH paper review must be in its OWN document (word 2003, ascii text and adobe acrobat are acceptable formats). The filename of each review must be in the form “REVIEW .”. For example, for a ...
متن کاملPDF Steganography based on Chinese Remainder Theorem
We propose different approaches of PDF files based steganography, essentially based on the Chinese Remainder Theorem. Here, after a cover PDF document has been released from unnecessary characters of ASCII code A0, a secret message is hidden in it using one of the proposed approaches, making it invisible to common PDF readers, and the file is then transmitted through a non-secure communication ...
متن کاملProcessing and Performance of Text File Format on Different Data Storage Systems
Text is the Data, that consists of characters representing the words and symbols of human speech and usually, characters coded according to the ASCII standard, which assigns numeric values to numbers, letters, and certain symbols. Text is obviously the simplest of data type and required the learnt amount of storage in addition that text data can he made fields in a data issue that can be indexe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013