Indiscernible Communication through ASCII Text Document/File (Communication in Veil)

نویسنده

  • Khan Farhan Rafat
چکیده

Internet has embarked comforting impact on people’s lives across the globe as personal tasks such as cash transactions, mails, fax, data storage or retrieval etc. are now preferably being done electronically using personal computers/cell phones/TABs etc. This, however, has also elevated issues vis-à-vis availability, legitimacy, and renunciation of information causing discomfort in information security field because the number of cases including copyright infringement, heavy financial loss on account of e-theft of credit cards, impersonation through hacking of social IDs etc. are on increase, and calls for their immediate remedy. Steganography – the art and science of oblivious communication – has emerged as an exciting research area for expert and naïve academics now days to mitigate aforesaid security issues and is the prima facie of our research that focuses on evolving secure ASCII text-cover centric data hiding scheme for stealth communication.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Communication in Veil: Enhanced Paradigm for ASCII Text Files

Digitization has a persuasive impact on information and communication technology (ICT) field which can be realized from the fact that today one seldom think to stand in long awaiting queue just to deposit utility bills, buy movie ticket, or dispatch private letters via post office etc. as these and other such similar activities are now preferably being done electronically over internet which ha...

متن کامل

A new approach to covert communication via PDF files

A new covert communication method via PDF files is proposed. A secret message, after being encoded by a special ASCII code and embedded at between-word and betweencharacter locations in the text of a PDF file, becomes invisible in the window of a common PDF reader, creating a steganographic effect for secret transmission through the PDF file. Experimental results show the feasibility of the pro...

متن کامل

How to Hand It In

WHAT TO HAND IN 1. A document (word 2003, ascii text and adobe acrobat are acceptable formats) containing answers to the homework questions 1 through 3. 2. TWO Paper reviews. EACH paper review must be in its OWN document (word 2003, ascii text and adobe acrobat are acceptable formats). The filename of each review must be in the form “REVIEW .”. For example, for a ...

متن کامل

PDF Steganography based on Chinese Remainder Theorem

We propose different approaches of PDF files based steganography, essentially based on the Chinese Remainder Theorem. Here, after a cover PDF document has been released from unnecessary characters of ASCII code A0, a secret message is hidden in it using one of the proposed approaches, making it invisible to common PDF readers, and the file is then transmitted through a non-secure communication ...

متن کامل

Processing and Performance of Text File Format on Different Data Storage Systems

Text is the Data, that consists of characters representing the words and symbols of human speech and usually, characters coded according to the ASCII standard, which assigns numeric values to numbers, letters, and certain symbols. Text is obviously the simplest of data type and required the learnt amount of storage in addition that text data can he made fields in a data issue that can be indexe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013