scholarly journals A Novel Text Steganographic Technique Using Specific Alphabets

2016 ◽  
Vol 2 (1) ◽  
pp. 1-11 ◽  
Author(s):  
May Htet ◽  
Su Wai Phyo

In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its capacity depends on the similarity of characters of the words in cover text. In addition, as further improvement for security, secret message encryption is performed using Blowfish algorithm before hiding into the innocuous cover text. 

2018 ◽  
Vol 7 (2) ◽  
pp. 260-265 ◽  
Author(s):  
Yulia Fatma ◽  
Harun Mukhtar ◽  
Muhammad Taufik

The internet network is growing rapidly and has a great impact on human life. The development of the internet network has enabled many people to exchange information or messages,one of tham by using email media. Apparently the internet is a path that in ni not too safe because it is a common communication media that can be used by everyone so prone to tapping information or messages. Therefore, security and confidentiality are needed in data communications. One may to keep messages safe is to use steganography technique. The steganography method used is the method of message insertion using BPCS (Bit Plane Complexity Segmentation). Before the message is inserted, the message is first encrypted using cryptography techniques. The cryptographic algorithm used is RSA algorithm. RSA algorithm consists of encryption algorithm and decryption algorithm. The confidential message is encrypted using RSA encryption algorithm and inserted using the insertion method of BPCS. With the technique of steganography on the image media then the delivery of a secret message will have a good level of security because it can not be detected directly by the senses of human vision. Keywords: cryptography, steganography, RSA, method BPCS   Abstrak Jaringan internet berkembang dengan pesat dan memberikan pengaruh besar bagi kehidupan manusia. Perkembangan jaringan Internet telah memungkinkan banyak orang untuk saling bertukar informasi atau pesan salah satunya dengan media email. Ternyata, internet merupakan jalur yang tidak terlalu aman karna merupakan media komunikasi umum yang dapat digunakan semua orang sehingga rawan penyadapan informasi atau pesan. Oleh karena itu, keamanan dan kerahasiaan sangat dibutuhkan dalam komunikasi data. Salah satu cara untuk menjaga keamanan pesan adalah menggunakan teknik steganografi. Metode steganografi yang digunakan adalah metode penyisipan pesan, dengan menggunakan metode BPCS (Bit Plane Complexity Segmentation). Sebelum pesan disisipkan terlebih dahulu pesan tersebut dienkripsi dengan menggunakan teknik kriptografi. Algoritma kriptografi yang digunakan adalah algoritma RSA. Algoritma RSA terdiri dari algoritma enkripsi dan algoritma dekripsi. Pesan rahasia disandikan menggunakan algoritma enkripsi RSA dan disisipkan menggunakan metode penyisipan BPCS. Dengan adanya teknik steganografi pada media citra maka pengiriman suatu pesan yang bersifat rahasia akan memiliki tingkat keamanan yang baik karena tidak dapat dideteksi langsung oleh indera penglihatan manusia. Keywords: Kriptografi, Steganogari, RSA, Metode BPCS


2015 ◽  
Vol 74 (6) ◽  
Author(s):  
Mohsen Bazyar ◽  
Rubita Sudirman

Audio techniques have been developed for audio streaming on the internet. Using the TCP/IP protocol, audio file can be uploaded, downloaded, and transmitted through the internet. This benefit of transmission makes the interest in using audio as cover object in steganography become much stronger. Capacity which is one of the most important properties of audio steganographic methods, evaluates the amount of possible embedding data within the audio file. A new embedding technique of audio steganography is proposed to increase the carrier medium capacity for substitution additional hidden message. With respect to the performed tests, the algorithm succeeds to increase the depth of embedding layer, without having effects on the signal transparency. The maximum number of bits without significant effect on host audio signal for LSB audio steganography is 4 LSBs. The secret message bits are hidden into variable and multiple LSBs layer in this method. Experimental results show that the use of this new technique which apply 7 LSBs for data embedding in comparison the LSB standard algorithm with 4 LSBs improve data hiding capacity of carrier audio by 35% to 55%. It can be observed from listening tests that there is no significant difference between the stego audio acquired from the novel technique and the main signal.  


2020 ◽  
Vol 17 (12) ◽  
pp. 5279-5295
Author(s):  
S. Jahnavi ◽  
C. Nandini

With increase in growth of data and digital threat, demand of securing the data communicated over the internet is an essential play in the digital world. In the vision of digitalizing services with the next generation of security to the sensitive data transmitted over the internet by hiding the existence of the data using next generation cryptography by fusing cryptography techniques is one the major technique adopted. With this the aim in traditional Least Significant Bit (LSB) is one of the widely used technique. Where the secret message or image are placed in the cover image in the least significant bits of RGB Channels resulting in a stego image. But the drawback is, on suspecting the differences in the pixels of original and stegoimage in the secret data embedded can be guessed and extracted by attacker. The Proposed visual crypto-mask steganography method overcomes this drawback and support good payload capacity with multi modal approach of embedding biometrics, resulting in ∞ PSNR. The authenticated person face and fingerprint information is transmitted in a cover image and mask image (magic sheet) using proposed steganography and is combined with Random Visual Crypto Technique. Which results in enhanced and advance visual crypto steganography secured model in communicating sensitive (biometric features) information over the internet. Where the complete information cannot be extracted using only cover image. Mask image (magic sheet) is used along with cover image that reveals the secret data in the receiving end.


2019 ◽  
Vol 8 (4) ◽  
pp. 3369-3373

In present world data transfer using the internet is growing. It is very easy and fast way to transfer information like confidential documents, economic transactions, business applications and other covert information over internet. With the advent and growth of internet, people are more concerned about security of information. Data Security is important while data is transferred over internet because any illegal user can access important and private data also make it worthless. Research in data security area will help government agencies, military organization and private companies to securely transmit their confidential data over internet. From past few years various steganography techniques have been developed to hide secret message using various multimedia objects having large amount of redundant data to support steganography. In this paper introduction about steganography, related concepts and implementation of commonly used spatial domain techniques like LSB(Least Significant Bit Technique) with modulus, PVD(Pixel Value Difference) with LSB replacement and adaptive data hiding over edges with LSB are considered. It is observed(while visual, statistical analysis and experiments were carried out) with benchmark cover and stego objects that embedding same amount of secret data in each pixel leads to more visible distortions in a stego image because all pixels do not bear same amount of changes and this effect is more observed in smooth area then edges. Improving stego image imperceptibility and adjusting hiding capacity adaptively are major related research challenges about spatial domain techniques.


Author(s):  
Frag Hassen Alzele

The current study aims to identify the factors which impact using of e-commerce from the point of view of the Saudi consumer, the researcher relied upon the descriptive-analytical method as a proper method for this study, whereas the effective factors on e-commerce were described and analyzed data and private information of the research sample from the consumers at Al-Qunfudah Governorate, the study sample consisted of (100) consumers from the study community with total numbers (350) consumers and the researcher relied upon the random sample to assure the inclusivity of distribution the questionnaire to the study community, and he relied upon a form of the questionnaire as the main tool to collect the private data of this study. The important outcomes which the study reached are the existence of a positive effect with a statistical significance between all of the safety and privacy and the readiness of the companies and usage of e-commerce, and the important recommendations of this study were: the necessity to bind the communications companies to increase the means of safety and privacy on the internet, whereas this leads the dealers' fee of safety in practicing e-commerce, in addition to work to develop the means of communication and internet to publish e-commerce.


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2113
Author(s):  
Simun Yuk ◽  
Youngho Cho

The webpage steganography technique has been used for a covert communication method for various purposes in which a sender embeds a secret message into a plain webpage file like an HTML file by using various steganography methods. With human eyes, it is very difficult to distinguish between the original webpage (cover webpage) and the modified webpage with the secret data (stego webpage) because both are displayed alike in a web browser. In this approach, when two communicating entities want to share a secret message, a sender uploads a stego webpage to a web server or modifies an existing webpage in the web server by using a webpage steganography method, and then a receiver accesses the stego webpage to download and extract the embedded secret data from it. Meanwhile, according to our extensive survey, we observed that most webpage steganography methods focused on proposing or improving steganography algorithms but did not well address how to operate a stego webpage as time passes. However, if a stego webpage is used in a static way such that the stego webpage does not change and is constantly exposed to web clients until the sender removes it, such a static operation approach will limit or badly affect the hiding capacity and undetectability of a webpage steganography method. By this motivation, in this paper, we proposed a time-based dynamic operation model (TDOM) that improves the performance of existing webpage steganography methods in terms of hiding capacity and undetectability by dynamically replacing the stego webpage with other stego webpages or the original webpage. In addition, we designed two time-based dynamic operation algorithms (TDOA-C and TDOA-U), which improve the hiding capacity of existing methods and TDOA-U for improving the undetectability of existing methods, respectively. To validate our model and show the performance of our proposed algorithms, we conducted extensive comparative experiments and numerical analysis by implementing two webpage steganography methods with our TDOM (CCL with TDOA-C and COA with TDOA-C) and tested them in the web environment. According to our experiments and analysis, our proposed algorithms could significantly improve the hiding capacity and undetectability of two existing webpage steganography methods.


Metahumaniora ◽  
2018 ◽  
Vol 8 (3) ◽  
pp. 300
Author(s):  
Tania Intan ◽  
Trisna Gumilar

AbstrakPenelitian ini bertujuan untuk (1) mendekripsikan tanggapan pembaca terhadap novel Le Petit Prince (2) mendeskripsikan horizon harapan pembaca terhadap novel Le Petit Prince, dan (3) mendeskripsikan faktor-faktor penyebab perbedaan tanggapan dan horizon harapan pembaca. Penelitian ini termasuk jenis penelitian deskriptif kualitatif. Data penelitian berupa teks yang memuat tanggapan pembaca novel Le Petit Princeyang terdiri dari 20 orang, sedangkan sumber datanya berupa artikel dan makalah yang dimuat di media massa cetak dan elektronik termasuk internet. Instrumen penelitian berupa seperangkat konsep tentang pembaca, tanggapan pembaca, dan horizon harapan. Teknik pengumpulan data dengan cara observasi dan data dianalisis dengan menggunakan teknik deskriptif kualitatif. Hasil penelitian yang didapat sebagai berikut. (1) Seluruh pembaca menanggapi atau menilai positif unsur tema, alur, tokoh, latar, sudut pandang, gaya bahasa, teknik penceritaan, bahasa, dan isi novel Le Petit Prince. (2) Harapan sebagian besar pembaca sebelum membaca novel Le Petit Prince sesuai dengan kenyataan ke sembilan unsur di dalam novel Le Petit Prince, sehingga pembaca dapat dengan mudah menerima dan memberikan pujian pada novel Le Petit Prince. (3) Faktor penyebab perbedaan tanggapan dan horizon harapan pembaca selain perbedaan stressing unsur yang ditanggapi juga karena perbedaan pengetahuan tentang sastra, pengetahuan tentang kehidupan, dan pengalaman membaca karya sastra.Kata kunci: tanggapan pembaca, horizon harapan, Le Petit PrinceAbstractThis study aims to (1) describe reader’s responses to the novel Le Petit Prince (2) to describe the reader's expectations horizon of Le Petit Prince's novel, and (3) to describe the factors causing differences in responses and the horizon of readers' expectations. This research is a descriptive qualitative research type. The research data consist of a set of paragraphs that contains readers' responses to Le Petit Prince's novel, while the data sources are articles and papers published in print and electronic mass media including the internet. The research instruments are a set of reader concepts, reader responses, and expectations horizon. The technique of collecting data is observation and data are analyzed by using qualitative descriptive technique. The results obtained are as follow: (1) All readers respond and valuethe theme elements,plots, characters, background, point of view, language, titles, storytelling techniques, language, and extrinsic novel Le Petit Prince positively. (2) The expectations of most readers before reading Le Petit Prince's novels are in accordance with the nine facts in Le Petit Prince's novel, so readers can easily accept and give prise to Le Petit Prince's novel. (3) Factors causing differences in responses and horizon of readers' expectations other than the stressing differences of the elements being addressed also due to the differences in knowledge of literature, knowledge of life and literary reading experience. Keywords: readers responses, expectations horizon, Le Petit Prince


2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


2008 ◽  
Vol 2008 ◽  
pp. 1-9 ◽  
Author(s):  
Peter Quax ◽  
Jeroen Dierckx ◽  
Bart Cornelissen ◽  
Wim Lamotte

The explosive growth of the number of applications based on networked virtual environment technology, both games and virtual communities, shows that these types of applications have become commonplace in a short period of time. However, from a research point of view, the inherent weaknesses in their architectures are quickly exposed. The Architecture for Large-Scale Virtual Interactive Communities (ALVICs) was originally developed to serve as a generic framework to deploy networked virtual environment applications on the Internet. While it has been shown to effectively scale to the numbers originally put forward, our findings have shown that, on a real-life network, such as the Internet, several drawbacks will not be overcome in the near future. It is, therefore, that we have recently started with the development of ALVIC-NG, which, while incorporating the findings from our previous research, makes several improvements on the original version, making it suitable for deployment on the Internet as it exists today.


2021 ◽  
Vol 17 (1) ◽  
pp. 260-264
Author(s):  
Alexandru VULPE ◽  
Raluca ANDREI ◽  
Alexandru BRUMARU ◽  
Octavian FRATU

Abstract: With the development of mobile devices and the advent of smartphones, the Internet has become part of everyday life. Any category of information about weather, flight schedule, etc. it is just a click away from the keyboard. This availability of data has led to a continuous increase in connectivity between devices, from any corner of the world. Combining device connectivity with systems automation allows the collection of information, its analysis and implicitly decision-making on the basis of information. Their introduction and continued expansion of devices that communicate in networks (including the Internet) have made security issues very important devices as well as for users. One of the main methodologies that ensures data confidentiality is encryption, which protects data from unauthorized access, but at the cost of using extensive mathematical models. Due to the nature of IoT devices, the resources allocated to a device can be constrained by certain factors, some of which are related to costs and others to the physical limitations of the device. Ensuring the confidentiality of data requires the use of encryption algorithms for these interconnected devices, which provide protection while maintaining the operation of that device. The need for these types of algorithms has created conditions for the growth and development of the concept of lightweight encryption, which aim to find encryption systems that can be implemented on these categories of devices, with limited hardware and software requirements. The paper proposes a lightweight cryptographic algorithm implemented on a microcontroller system, comparing its performances with those of the already existing system (based on x86).


Sign in / Sign up

Export Citation Format

Share Document