A novel approach of secret message passing through text steganography

Author(s):  
Santanu Koley ◽  
Kunal Kumar Mandal
2017 ◽  
Vol 7 (2) ◽  
pp. 1482-1485
Author(s):  
S. Malalla ◽  
F. R. Shareef

Steganography is the science of hiding certain messages (data) in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text) in another text (cover text) so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG) method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.


Author(s):  
M.Grace Vennice ◽  
M. Swapna ◽  
MD.Ahmad Ali ◽  
T.Dharma Reddy

The Often Distribution of encrypted messages will depict the concentration of third parties. The attempts can be made to break and expose the actual messages by the hackers and cracker crackers. To conceal the subsistence of message steganography is introduced by hiding a secret message inside another credulous message.Steganography along with cryptograph y is used and offers suitable amount of privacy and security over the communication cha channel. nnel. In this paper along with various existing text text-based steganography techniques, an overview of text steganography and a concise history of steganography can be presented. The problems present in the text steganography and issues with existing solution solutionss are highlighted. In information hiding, a novel approach is proposed by using inter-word word spacing and inter inter-paragraph paragraph spacing as a hybrid method. Based on the length of the secret message, the proposed method provides dynamic generated stego stego-text with six ix options of maximum capacity. The considerable drawbacks of every existing method and how our new approach might be recommended as a solution can be analyzed in this paper.


2021 ◽  
Vol 11 (15) ◽  
pp. 6851
Author(s):  
Reema Thabit ◽  
Nur Izura Udzir ◽  
Sharifah Md Yasin ◽  
Aziah Asmawi ◽  
Nuur Alifah Roslan ◽  
...  

Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. As text uses low bandwidth, it is commonly used by Internet users in their daily activities, resulting a vast amount of text messages sent daily as social media posts and documents. Accordingly, text is the ideal object to be used in steganography, since hiding a secret message in a text makes it difficult for the attacker to detect the hidden message among the massive text content on the Internet. Language’s characteristics are utilized in text steganography. Despite the richness of the Arabic language in linguistic characteristics, only a few studies have been conducted in Arabic text steganography. To draw further attention to Arabic text steganography prospects, this paper reviews the classifications of these methods from its inception. For analysis, this paper presents a comprehensive study based on the key evaluation criteria (i.e., capacity, invisibility, robustness, and security). It opens new areas for further research based on the trends in this field.


Symmetry ◽  
2022 ◽  
Vol 14 (1) ◽  
pp. 111
Author(s):  
Mingliang Zhang ◽  
Zhenyu Li ◽  
Pei Zhang ◽  
Yi Zhang ◽  
Xiangyang Luo

Behavioral steganography is a method used to achieve covert communication based on the sender’s behaviors. It has attracted a great deal of attention due to its robustness and wide application scenarios. Current behavioral steganographic methods are still difficult to apply in practice because of their limited embedding capacity. To this end, this paper proposes a novel high-capacity behavioral steganographic method combining timestamp modulation and carrier selection based on social networks. It is a steganographic method where the embedding process and the extraction process are symmetric. When sending a secret message, the method first maps the secret message to a set of high-frequency keywords and divides them into keyword subsets. Then, the posts containing the keyword subsets are retrieved on social networks. Next, the positions of the keywords in the posts are modulated as the timestamps. Finally, the stego behaviors applied to the retrieved posts are generated. This method does not modify the content of the carrier, which ensures the naturalness of the posts. Compared with typical behavioral steganographic methods, the embedding capacity of the proposed method is 29.23∼51.47 times higher than that of others. Compared to generative text steganography, the embedding capacity is improved by 16.26∼23.94%.


2009 ◽  
Vol 21 (8) ◽  
pp. 2152-2202 ◽  
Author(s):  
J. Dauwels ◽  
F. Vialatte ◽  
T. Weber ◽  
A. Cichocki

We present a novel approach to quantify the statistical interdependence of two time series, referred to as stochastic event synchrony (SES). The first step is to extract “events” from the two given time series. The next step is to try to align events from one time series with events from the other. The better the alignment, the more similar the two time series are considered to be. More precisely, the similarity is quantified by the following parameters: time delay, variance of the timing jitter, fraction of noncoincident events, and average similarity of the aligned events. The pairwise alignment and SES parameters are determined by statistical inference. In particular, the SES parameters are computed by maximum a posteriori (MAP) estimation, and the pairwise alignment is obtained by applying the max-product algorithm. This letter deals with one-dimensional point processes; the extension to multidimensional point processes is considered in a companion letter in this issue. By analyzing surrogate data, we demonstrate that SES is able to quantify both timing precision and event reliability more robustly than classical measures can. As an illustration, neuronal spike data generated by the Morris-Lecar neuron model are considered.


2014 ◽  
Vol 14 (2) ◽  
pp. 5479-5486
Author(s):  
Ali Hussein Hadi

This paper presents a novel covert channel for secret communications. It implements a new application layer covert channel, by applying multimedia steganography techniques to hide secret messages. This new channel method (called Under Your Radar (UYR)) provides a stealthiness method for the communication channel and an efficient method for hiding messages, as proved by our investigations. Such a covert channel will be used for transferring secret messages in two phases. In phase one, the message characters will be embedded randomly into the pixels of video frames. The choice of pixels is dependent on finding an identical value of the character ASCII representation from one of the pixel channels. The positions of pixels will form the steganography key, which will be used later to extract the message. Also, the steganography key will be embedded in an image using the LSB steganography technique. In phase two, the secret message will be exchanged between the sender and the receiver by sharing the video along with the steganography key over a public service (e.g.  a social network), which serves as the new covert communication channel. The experiments outcomes have showed an improvement on the success of the proposed covert channel in exchanging secret messages without rising suspicion by observers or detection tools.


Author(s):  
Ahlam R. Khekan ◽  
Hiba Mohammed Wajeh Majeed ◽  
Omer F. Ahmed Adeeb

<span>With the increasing technological and electronic development, methods have been developed to hide important information using text steganography as a new technology, since it is not noticeable and easy to send and receive. The use of the Arabic language is one of the new methods used to hide data. In this work, we preview our method that depends to use the part of Arabic language properties to embed the secret English message in to cover text to create text steganography. More than half of the Arabic characters contain dots. Several characters have upper dots and others have lower dots. Some have one dot others have two dots. Few have even three dots. In this new idea, we will use the dots of charters to embed the English secret message. First, we will compress the secret message by using the 5-Bit Encoding (T-5BE) to make the cover text able to embed more bits of the secret message by 37.5%. Then we start using the Arabic semantic dictionary to correct the hiding path and enhancement the stego-cover text to eliminate errors caused by switching words. In this research, we were able to extract experimental results that show that the proposed model achieves high masking accuracy in addition to the storage capacity of the cover text.</span>


Sign in / Sign up

Export Citation Format

Share Document