Ensuring the Security of Text-based Information Transmission by Utilizing Invisible ASCII Characters

نویسندگان

  • Zhujuan MA
  • Erzhou ZHU
  • Yiwen ZHANG
  • Cheng ZHANG
چکیده

The universal storage and transmission of information by text-based documents makes information hiding technology an important topic in computer security. Currently, the popularly used text-based information techniques are facing many problems, such as poor robustness, low embedding rate, semantic clutter and can be easily distinguished by unaided eyes. In order to solve these problems, this paper puts forward a secret information transmission scheme for English texts by using the characteristics of some invisible ASCII codes. The scheme incorporates two stages, the information hiding stage and the information extracting stage. The first stage takes the prepared carrier documents and the secret information need to be embedded as the input. Then, the information hiding procedure of the scheme will synthesize the carrier document and the secret information into a steno (shorthand) document. In the second stage, an extracting procedure will pick up the secret information when it receives the steno document that generated by the first stage. The scheme achieves hiding effects by processing the bland spaces in the English texts. The experimental results have shown that our information hiding scheme is feasible, reliable, safe and efficient.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Lexical tools to convert Unicode characters to ASCII.

Unicode is an industry standard allowing computers to consistently represent and manipulate text expressed in most of the worlds writing systems. It is widely used in multilingual NLP (natural language processing) projects. On the other hand, there are some NLP projects still only dealing with ASCII characters. This paper describes methods of utilizing lexical tools to convert Unicode character...

متن کامل

A Novel Scheme for Text Information Hiding into a Carrier Image Based on BCH Code and HVS Model

The issue of security becomes more and more important in the process of information transmission. The paper proposes a novel transmission scheme for text information by hiding it into a carrier image. Firstly, we use ASCII codes to represent the text information and encode these information codes by BCH code before transmitting them. Secondly, we divide the carrier image into 8×8 blocks and tra...

متن کامل

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem

Achieving higher level of security in message transfer over networked environment and the efficiency of a cryptographic algorithm is based on its time taken for encryption / decryption and the way it produces different cipher text from a clear text. The RSA, the widely used public key algorithm and other public key algorithms may not guarantee that the cipher text is fully secured. As an altern...

متن کامل

Improve Invisible Ink Production by the Europium Complexes

The invisible inks have many applications, including the use of banknote printing, code load, securitydocuments and much of its application in the exchange of security information. Photoluminescenceproperties of lanthanide compounds that attracted the attention of many scholars in recent decades are one ofthe important factors in drying and fluidity of the ink. The solvent eva...

متن کامل

ASCII Art Synthesis with Convolutional Networks (final copy)

ASCII art is a type of graphic art that presents a picture with printable characters. It is commonly used for graphical presentations in text-based media. ASCII art can be categorized into two major styles: one is tone based, and the other is structure based. Tone-based ASCII art represents the intensity distribution of the original images by using the density of the characters. In contrast, st...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016