Text Steganography System Using Markov Chain Source Model and DES Algorithm

نویسندگان

  • Weihui Dai
  • Yue Yu
  • Yonghui Dai
  • Bin Deng
چکیده

High transmission efficiency, low resource occupancy and intelligible meaning make text message as the most commonly used type of media in our daily communication. Text steganography, an information hiding technology based on text message, has been a new exploring research in recent years. Due to the restriction of redundant information as well as its alterability in manual operation, text message is difficult to hide secret information effectively and reliably. Based on Markov Chain source model and DES algorithm, this paper presents a text steganography system for spelling languages. It can work reliably with the capability of immunity from regular operations, such as formatting, compressing and sometimes manual altering operation in text size, front, color and the space between words. By adopting the technique of heuristic composition, this system can produce cover text close to nature language. It’s suitable for hiding short information in online communication, such as E-mail, MSN Messenger, QQ, instant conversation and the short message on mobile phone.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Approach for Text Steganography Based on Markov Chains

A text steganography method based on Markov chains is introduced, together with a reference implementation. This method allows for information hiding in texts that are automatically generated following a given Markov model. Other Markov based systems of this kind rely on big simplifications of the language model to work, which produces less natural looking and more easily detectable texts. The ...

متن کامل

High capacity steganography tool for Arabic text using 'Kashida'

Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...

متن کامل

Optimizing location, routing and inventory decisions in an integrated supply chain network under uncertainty

This study extends a mathematical model that integrates the location, allocation, inventory replenishment and routing decisions simultaneously. To cope with inherent uncertainty of parameters, we implement a continuous-time Markov process and derive the performance measures of the system. Using the obtained results, the problem is formulated as a mixed integer nonlinear programing model (MINLP)...

متن کامل

Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words

Linguistic steganography is a branch of Information Hiding (IH) using written natural language to conceal secret messages. It plays an important role in Information Security (IS) area. Previous work on linguistic steganography was mainly focused on steganography and there were few researches on attacks against it. In this paper, a novel statistical algorithm for linguistic steganography detecti...

متن کامل

Four key Secured Data Transfer Using Steganography and Cryptography

Steganography and cryptography are used to send the data in a confidential way. Steganography hides the existing message and cryptography will confuse the message. The transformation of plain text to cipher text is called as encryption. The transformation of cipher text to plain text is called decryption. Encryption and decryption are controlled by keys. Hashing, symmetric and asymmetric algori...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JSW

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2010