Communication in Veil: Enhanced Paradigm for ASCII Text Files
نویسندگان
چکیده
Digitization has a persuasive impact on information and communication technology (ICT) field which can be realized from the fact that today one seldom think to stand in long awaiting queue just to deposit utility bills, buy movie ticket, or dispatch private letters via post office etc. as these and other such similar activities are now preferably being done electronically over internet which has shattered the geographical boundaries and has tied the people across the world into a single logical unit called global village. The efficacy and precision with which electronic transactions are made is commendable and is one of the reasons why more and more people are switching over to e-commerce for their official and personal usage. Via social networking sites one can interact with family and friends at any time of his/her choice. The darker side of this comforting aspect, however, is that the contents sent on/off-line may be monitored for active or passive intervention by the antagonistic forces for their illicit motives ranging from but not only limited to password, ID and social security number theft to impersonation, compromising personal information, blackmailing etc. This necessitated the need to hide data or information of some significance in an oblivious manner in order to detract the enemy as regards its detection. This paper aims at evolving an avant-garde information hiding scheme for ASCII text files a research area regarded as the most difficult in contrast to audio, video or image file formats for the said purpose. Keywords— Embedded Secrets; Hide and Seek; Eccentric way of writing; ASCII Text Steganography; Communication in Veil; Stealth Communication
منابع مشابه
Indiscernible Communication through ASCII Text Document/File (Communication in Veil)
Internet has embarked comforting impact on people’s lives across the globe as personal tasks such as cash transactions, mails, fax, data storage or retrieval etc. are now preferably being done electronically using personal computers/cell phones/TABs etc. This, however, has also elevated issues vis-à-vis availability, legitimacy, and renunciation of information causing discomfort in information ...
متن کاملA new approach to covert communication via PDF files
A new covert communication method via PDF files is proposed. A secret message, after being encoded by a special ASCII code and embedded at between-word and betweencharacter locations in the text of a PDF file, becomes invisible in the window of a common PDF reader, creating a steganographic effect for secret transmission through the PDF file. Experimental results show the feasibility of the pro...
متن کاملHZ - A Data Format for Exchanging Files of Arbitrarily Mixed Chinese and ASCII characters
Most existing computer systems which can handle a text file of arbitrarily mixed Chinese and ASCII characters use 8-bit codes. To exchange such text files through electronic mail on ASCII computer systems, it is necessary to encode them in a 7-bit format. A generic binary to ASCII encoder is not sufficient, because there is currently no universal standard for such 8-bit codes. For example, CCDO...
متن کاملIntegrating Programs and Documentation
A simple tool called PD system is described and offered for general use that allows one to integrate programs and their documentation in ASCII files. Such a program with documentation file (PD file) consists of alternating documentation and program sections. PD files can be compiled directly; for a compiler, documentation sections are just commentaries to be ignored. On the other hand, the PD s...
متن کاملEnhancing the security of caesar cipher substitution method using a randomized approach for more secure communication
Caesar cipher is an ancient, elementary method of encrypting plain text message into cipher text protecting it from adversaries. However, with the advent of powerful computers, there is a need for increasing the complexity of such techniques. This paper contributes in the area of classical cryptography by providing a modified and expanded version for Caesar cipher using knowledge of mathematics...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013