Text Steganographic Approaches: A Comparison

نویسنده

  • Monika Agarwal
چکیده

This paper presents three novel approaches of text steganography. The first approach uses the theme of missing letter puzzle where each character of message is hidden by missing one or more letters in a word of cover. The average Jaro score was found to be 0.95 indicating closer similarity between cover and stego file. The second approach hides a message in a wordlist where ASCII value of embedded character determines length and starting letter of a word. The third approach conceals a message, without degrading cover, by using start and end letter of words of the cover. For enhancing the security of secret message, the message is scrambled using one-time pad scheme before being concealed and cipher text is then concealed in cover. We also present an empirical comparison of the proposed approaches with some of the popular text steganographic approaches and show that our approaches outperform the existing approaches.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably Secure Universal Steganographic Systems

We propose a simple universal (that is, distribution–free) steganographic system in which covertexts with and without hidden texts are statistically indistinguishable. Moreover, the proposed steganographic system has two important properties. First, the rate of transmission of hidden information approaches the Shannon entropy of the covertext source as the size of blocks used for hidden text en...

متن کامل

Experimenting with the Novel Approaches in Text Steganography

As is commonly known, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders to protect the data from the prying eyes. However, using text as the target medium is relatively difficult as compared to the other target media, because of the lack of available redundant information in a text file. In ...

متن کامل

A Survey of Data Mining Techniques for Steganalysis

The skill of observing the invisible embedded messages in images, audio, video, text as multimedia and protocols called Steganalysis. An efficient steganalysis method should determine the existence of implanted messages and stego digital image and present some results about the used steganographic algorithm. The challenging problem of this study is a massive quantity of stego hosts to learn val...

متن کامل

A Comparative Analysis of Steganographic Tools

Steganography is the art and science of hiding data in a transmission medium. It is a sub-discipline of security systems. In this paper we present a study carried out to compare the performance of some common Steganographic tools distributed online. We focus our analysis on systems that use digital images as transmission carriers. A number of these systems exceptionally do not support embedding...

متن کامل

Survey on Information Hiding Techniques and Analysis of Quality Assessment Parameters

Due to the increasing demand of various internet applications such as voice over IP (VOIP), audio conferencing etc. it is required that the data is transmitted in a more secure and robust manner. Direct transmission of data over the communication channel is not secure as it can be easily manipulated and is prone to interception by eavesdroppers. So as an attractive solution to these issues, var...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1302.2718  شماره 

صفحات  -

تاریخ انتشار 2013