scholarly journals USAGE OF THE STEGANOGRAPHIC ALGORITHMS FOR TEXT INFORMATION HIDING

Author(s):  
A. Lagun

Today cryptographic and steganographic systems provide the best information security of society. Cryptography transforms information into the incomprehensible form with using the cryptographic keys and algorithms. Steganography hides the secret information in unknown place of object. The steganographic algorithms, which hide message in text container, are researched in the article. For process of hiding are used the text file-container properties. The hide message converts to the binary numbers system. User puts ones or zeros into the defined places of text file-container. These places have special characteristics. There may be two types of hiding: insertion and replacement. In case of insertion the hiding message adds to file-container with using invisible characters in viewing mode of text file. Then the size of full container with hided message is bigger than size of empty container. If used the replacing method then the characters of file-container replace to other characters that are almost the same as the first ones. For example, anyone is possible replacement of characters that have the same appearance in different languages. In this case the sizes of the empty and filled container remain the same. One of the simplest hiding methods is insertion the variable quantity of the space characters between words of text file. Suppose, that zero of hidden message is coded by one space character and one - is coded by two space characters. Therefore, depending on hidden message one or two space characters are located in different places of the text. Also, the author considers another hiding type, which uses the same view of some characters of different languages. If you look at the characters in Ukrainian and English, than the 18 characters in the each language is the same – 'a','c','e','i','o','p','x','A','B','C','E','H','I','K','O','P','T','X'. When hiding for the values of zeros in hidden message the file-container remains the same, and for the values of ones in hidden message the characters of language file-container replace to the same characters of another language (Ukrainian-English).The results of the algorithm work show us, that when using characters from different languages in the hiding process, the full file-container is much smaller than when encoding the space characters. The last algorithm which is considered in work uses tail space characters. It forms a filled container with enlarged text strings depending on the number of space characters which the hidden message determines. One character of hidden message is written in two file-container text strings. In particular the binary representation of each character is divided into two parts with four bits, and at the end of each text string is written no more than 15 space characters. The number of space characters corresponds to the decimal value of each part. To ensure hiding of secret message full container has the form aligned to the left edge of the text. Considered algorithms of hiding message in text container are used for the confidential information defense. Algorithms, which use insertion of invisible characters, allow hiding the amount of information that corresponds to the number of space characters with certain characteristics. The most of replacement algorithms hide more information than insertion algorithms. Also replacement algorithms do not change file-container size. For example, algorithm, which replace characters of different alphabets, hides such amount of information, which depends on the statistics of used languages. The most problem of using text containers is providing its steganographic defense. In particular, if user enables the unprintable character view in a text editor, then could see the some statistic of location invisible symbols added by the insertion methods. Therefore decoding of hidden message is simplified. The hidden message with using replacement algorithms is more defensible, but using of compression algorithms to the full container deletes the hidden information.

2020 ◽  
Vol 20 ◽  
pp. 17-22
Author(s):  
A. Lagun ◽  
O. Polotai

In the article has considered the peculiarities of steganographic algorithms implemenation for hiding information in inmoveable images. Authors has described different embedding algorithms which use the method of least significant bit. In particular, the use of digital filtering allows you to better select the necessary pixels for embedding, and the use of a pseudorandom sequence generator allows you to more effectively hide secret information, complicating the search for secret information to the attacker.From the existing color palettes to represent inmoveable images have been selected the most common RGB pal-ette, which contains red, green, and blue intensities to produce image pixels. Colors that are less sensitive to the human eye are used to form the filled steganographic containers to provide additional visual stability.Also, in the paper authors have investigated the features of hiding digital text information in a inmoveable image as a BMP file and have realized an algorithm that for images of different size allows you to hide a text file of the necessary size. In particular, the number of bytes of the secret message is written to the original container to retrieve the required number of characters during searching. In addition, it takes into account the peculiarities of forming a BMP file that contains additional alignment bytes of the string.In general, the algorithm allows you to select a container file of the appropriate size to hide the secret information, as well as the colors of the palette in which the information will be embedded. The extracting of secret information occurs until the number of bytes of the hidden message is reached. This value has recorded at the beginning of the hiding text. You can use encryption or compression algorithms to complication searching of clear text by attacker. Only users those who are aware of the algorithms used and perhaps the keys will be able to read the hidden information correctly.


2021 ◽  
Vol 48 (4) ◽  
Author(s):  
Zainab N. Sultani ◽  
◽  
Ban N. Dhannoon ◽  

Hiding the presence of data during communication has become a pressing concern in this overly digitalized world as a consequence of illegitimate access. These concerns have led to cryptography and steganography techniques as methods for securing data. This paper presents a modified information hiding technique based on an indirect least significant bit. Instead of saving each bit of the secret message in the least significant bit (LSB) of the cover media, each bit of the secret message is compared to a mask bit in the cover media. The result is saved in the cover media’s LSB. In this paper, two steganography schemas are designed in which the cover media are image and audio, while the secret message is a text file. A simple encryption technique is used to transform the secret message into an unreadable format before the hiding process begins. The experimental results indicate that the proposed algorithm achieves promising performance


2021 ◽  
Vol 83 (1) ◽  
pp. 72-79
Author(s):  
O.A. Kan ◽  
◽  
N.A. Mazhenov ◽  
K.B. Kopbalina ◽  
G.B. Turebaeva ◽  
...  

The main problem: The article deals with the issues of hiding text information in a graphic file. A formula for hiding text information in image pixels is proposed. A steganography scheme for embedding secret text in random image pixels has been developed. Random bytes are pre-embedded in each row of pixels in the source image. As a result of the operations performed, a key image is obtained. The text codes are embedded in random bytes of pixels of a given RGB channel. To form a secret message, the characters of the ASCII code table are used. Demo encryption and decryption programs have been developed in the Python 3.5.2 programming language. A graphic file is used as the decryption key. Purpose: To develop an algorithm for embedding text information in random pixels of an image. Methods: Among the methods of hiding information in graphic images, the LSB method of hiding information is widely used, in which the lower bits in the image bytes responsible for color encoding are replaced by the bits of the secret message. Analysis of methods of hiding information in graphic files and modeling of algorithms showed an increase in the level of protection of hidden information from detection. Results and their significance: Using the proposed steganography scheme and the algorithm for embedding bytes of a secret message in a graphic file, protection against detection of hidden information is significantly increased. The advantage of this steganography scheme is that for decryption, a key image is used, in which random bytes are pre-embedded. In addition, the entire pixel bits of the container image are used to display the color shades. It can also be noted that the developed steganography scheme allows not only to transmit secret information, but also to add digital fingerprints or hidden tags to the image.


2019 ◽  
Vol 7 (4) ◽  
pp. 254
Author(s):  
Nada E. Tawfiq

Image files can hide text without their size being affected too much. This process called steganography which allows hiding text in images without any suspicions from intruders. This paper addresses an improved LSB substitution algorithm for hiding Kurdish text information written in text file into digital image as steganography technique. The algorithm consists of two main phases, the first phase holds the encryption of the Kurdish text message and the embedded technique while the second phase hold the message extraction followed by decryption to get the original code of each character. The algorithm contains many procedures to enhance this process. Least Significant Bit method is used to hide the Kurdish text, in order to keep the features and characteristics of the original image. Applying the proposed approach shows that it seems work in a best case by hiding and retrieving text from the digital image which is used as a carrier of this text. Delphi 2010 was used to simulate both encrypt-embedded phase and extract-decrypt phase, and the results were obtained with high and security which proved the efficiency of the algorithm, where the hidden Kurdish text didn’t make any distortion or change over the cover image.


Author(s):  
Anu Singha ◽  
Phub Namgay

A tool which algorithmically traces the effectiveness of the text files would be helpful in determining whether the text file have all the characteristic of important concepts. Every text source is build up on key phrases, and these paramount phrases follow a certain grammatical linguistic pattern widely used. An enormous amount of information can be derived from these key concepts for the further analysis such as their dispersion, relationship among the concepts etc. The relationship among the key concepts can be used to draw a concept graphs. So, this chapter presents a detailed methodologies and technologies which evaluate the effectiveness of the extracted information from text files.


Steganography is with the intention of the art and science of writing secreted messages in such with the aim of nobody excluding the dispatcher and supposed recipient, suspects the existence of the message. We tend to tend to are constructing Associate in Nursing implementing a fresh algorithm supported activity an oversized amount of information (image, audio, text) file into color BMP image. We have been used adaptive image filtering and adaptive image segmentation with bits replacement on the suitable pixels. These image parts are elite willy-nilly rather than consecutive by using a brand new plan made public by main cases with their sub cases for each store unit in one component. this concept supports every visual and mathematics in line with the steps of fashion, we have been everywhere sixteen main cases with their sub cases that cowl all aspects of the computer file into color icon image. High-security layers are projected through 3 layers to form it arduous to interrupt through the committal to writing of the laptop file and confuse steganalysis too. These techniques are a great deal of useful for investigation the stego footage what is more as a result of the image media regarding security of images and embed the knowledge for advanced image area which we'll merely calculate approximately the high embed rate by victimization the quantitative steganalysis technique.


2021 ◽  
Vol 14 (2) ◽  
pp. 113-126
Author(s):  
Hasmawati Hasmawati ◽  
Ari Moesriami Barmawi

Headstega (Head steganography) is a noiseless steganography that used email headers as a cover for concealing messages. However, it has less embedding capacity and it raises suspicion. For overcoming the problem, bitwise operation is proposed.  In the proposed method, the message was embedded into the cover by converting the message and the cover into binary representation based on a mapping table that was already known by the sender and the receiver. Furthermore, XOR bitwise operations were applied to the secret message and cover bits based on random numbers that were generated using a modular function. Moreover, the result was converted into characters that represent the secret message bits. After embedding the message into the cover, an email alias was generated to camouflage the secret message characters. Finally, the sender sends the embedded cover and the email alias to the recipient. Using the proposed method, the embedding capacity is 89% larger than using the original Headstega. For reducing the adversary’s suspicion, the existing email address was used instead of creating a new email address.


Author(s):  
M.Grace Vennice ◽  
M. Swapna ◽  
MD.Ahmad Ali ◽  
T.Dharma Reddy

The Often Distribution of encrypted messages will depict the concentration of third parties. The attempts can be made to break and expose the actual messages by the hackers and cracker crackers. To conceal the subsistence of message steganography is introduced by hiding a secret message inside another credulous message.Steganography along with cryptograph y is used and offers suitable amount of privacy and security over the communication cha channel. nnel. In this paper along with various existing text text-based steganography techniques, an overview of text steganography and a concise history of steganography can be presented. The problems present in the text steganography and issues with existing solution solutionss are highlighted. In information hiding, a novel approach is proposed by using inter-word word spacing and inter inter-paragraph paragraph spacing as a hybrid method. Based on the length of the secret message, the proposed method provides dynamic generated stego stego-text with six ix options of maximum capacity. The considerable drawbacks of every existing method and how our new approach might be recommended as a solution can be analyzed in this paper.


2021 ◽  
Vol 21 ◽  
pp. 383-390
Author(s):  
Piotr Pawlak ◽  
Jakub Podgórniak ◽  
Grzegorz Kozieł

The computing power of modern computers is sufficient to break many cryptographic keys, therefore it is necessary to create an additional security layer which hides the very fact of transmitting a secret message. For this purpose, steganographic methods can be used. The article is devoted to the analysis of the possibility of implementing digital images steganography with the use of the C # programming language. Firstly, existing libraries and mathematical transformations which can help with performing steganography were found. Also, own code solutions were implemented. In order to objectively evaluate the methods of data hiding, the parameters describing the degree of distortion of transforms and hidden images were calculated. Subsequently, optimal solutions for specific problems were identified and demonstrational data hiding was performed. Based on the obtained results, it can be concluded that it is possible to successfully implement steganography in the C # language. There are many ready-made libraries and tools, the effectiveness of which has been verified in the conducted analysis. Due to the contradictory of stenographic requirements, it is not possible to meet all of them optimally, i.e. undetectability, resistance to destruction and information capacity. For this reason, it is not possible to clearly indicate the best solutions. In order to achieve satisfactory results, one should look for compromises between the set requirements.


1966 ◽  
Vol 24 ◽  
pp. 188-189
Author(s):  
T. J. Deeming

If we make a set of measurements, such as narrow-band or multicolour photo-electric measurements, which are designed to improve a scheme of classification, and in particular if they are designed to extend the number of dimensions of classification, i.e. the number of classification parameters, then some important problems of analytical procedure arise. First, it is important not to reproduce the errors of the classification scheme which we are trying to improve. Second, when trying to extend the number of dimensions of classification we have little or nothing with which to test the validity of the new parameters.Problems similar to these have occurred in other areas of scientific research (notably psychology and education) and the branch of Statistics called Multivariate Analysis has been developed to deal with them. The techniques of this subject are largely unknown to astronomers, but, if carefully applied, they should at the very least ensure that the astronomer gets the maximum amount of information out of his data and does not waste his time looking for information which is not there. More optimistically, these techniques are potentially capable of indicating the number of classification parameters necessary and giving specific formulas for computing them, as well as pinpointing those particular measurements which are most crucial for determining the classification parameters.


Sign in / Sign up

Export Citation Format

Share Document