scholarly journals The syntax of concealment: reliable methods for plain text information hiding

Author(s):  
Brian Murphy ◽  
Carl Vogel
2021 ◽  
Vol 1 (2) ◽  
pp. 340-364
Author(s):  
Rui Araújo ◽  
António Pinto

Along with the use of cloud-based services, infrastructure, and storage, the use of application logs in business critical applications is a standard practice. Application logs must be stored in an accessible manner in order to be used whenever needed. The debugging of these applications is a common situation where such access is required. Frequently, part of the information contained in logs records is sensitive. In this paper, we evaluate the possibility of storing critical logs in a remote storage while maintaining its confidentiality and server-side search capabilities. To the best of our knowledge, the designed search algorithm is the first to support full Boolean searches combined with field searching and nested queries. We demonstrate its feasibility and timely operation with a prototype implementation that never requires access, by the storage provider, to plain text information. Our solution was able to perform search and decryption operations at a rate of, approximately, 0.05 ms per line. A comparison with the related work allows us to demonstrate its feasibility and conclude that our solution is also the fastest one in indexing operations, the most frequent operations performed.


2013 ◽  
Vol 798-799 ◽  
pp. 423-426
Author(s):  
Xiao Feng Wang

Through the analysis of the hypertext markup, proposed and implemented several new methods of text information hiding. The concealment of these methods is better, Comprehensive utilization of these methods can obtain large information hiding capacity, better concealed. And they have better robustness for traditional attack.


Author(s):  
M.Grace Vennice ◽  
M. Swapna ◽  
MD.Ahmad Ali ◽  
T.Dharma Reddy

The Often Distribution of encrypted messages will depict the concentration of third parties. The attempts can be made to break and expose the actual messages by the hackers and cracker crackers. To conceal the subsistence of message steganography is introduced by hiding a secret message inside another credulous message.Steganography along with cryptograph y is used and offers suitable amount of privacy and security over the communication cha channel. nnel. In this paper along with various existing text text-based steganography techniques, an overview of text steganography and a concise history of steganography can be presented. The problems present in the text steganography and issues with existing solution solutionss are highlighted. In information hiding, a novel approach is proposed by using inter-word word spacing and inter inter-paragraph paragraph spacing as a hybrid method. Based on the length of the secret message, the proposed method provides dynamic generated stego stego-text with six ix options of maximum capacity. The considerable drawbacks of every existing method and how our new approach might be recommended as a solution can be analyzed in this paper.


2018 ◽  
Vol 2018 ◽  
pp. 1-22 ◽  
Author(s):  
Milad Taleby Ahvanooey ◽  
Qianmu Li ◽  
Hiuk Jae Shim ◽  
Yanyan Huang

With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.


Author(s):  
Jianjun Zhang ◽  
Yicheng Xie ◽  
Jun Shen ◽  
Lucai Wang ◽  
Haijun Lin

Sign in / Sign up

Export Citation Format

Share Document