scholarly journals A Hybrid Method of Hiding The Text Information Using Stegnography

Author(s):  
M.Grace Vennice ◽  
M. Swapna ◽  
MD.Ahmad Ali ◽  
T.Dharma Reddy

The Often Distribution of encrypted messages will depict the concentration of third parties. The attempts can be made to break and expose the actual messages by the hackers and cracker crackers. To conceal the subsistence of message steganography is introduced by hiding a secret message inside another credulous message.Steganography along with cryptograph y is used and offers suitable amount of privacy and security over the communication cha channel. nnel. In this paper along with various existing text text-based steganography techniques, an overview of text steganography and a concise history of steganography can be presented. The problems present in the text steganography and issues with existing solution solutionss are highlighted. In information hiding, a novel approach is proposed by using inter-word word spacing and inter inter-paragraph paragraph spacing as a hybrid method. Based on the length of the secret message, the proposed method provides dynamic generated stego stego-text with six ix options of maximum capacity. The considerable drawbacks of every existing method and how our new approach might be recommended as a solution can be analyzed in this paper.

Author(s):  
Mujtaba.S Memon ◽  
Dr. Asadullah Shah

This paper presents a new technique for information hiding in Arabic language. The technique uses text steganography to hide the information. Considering the existence of Harakat (Fatha, Kasra and Damma) in the languages a new approach of reversing the Fatha has been developed for message hiding. The technique has been also evaluated to ensure its quality. This technique can be applied on other languages like Persian, Sindhi and other Regional languages.


2017 ◽  
Vol 7 (2) ◽  
pp. 1482-1485
Author(s):  
S. Malalla ◽  
F. R. Shareef

Steganography is the science of hiding certain messages (data) in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text) in another text (cover text) so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG) method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.


Author(s):  
Dedi Irawan

The need for communication in the digital era at this time makes the insertion of information applicable to digital files / media such as images, video, audio and text. Steganography inserts a secret message in a file / media without anyone realizing that the media has a secret message. Steganography (information hiding) is a technique to hide secret messages on a media host or also called a media cover. Steganography comes from Greek which means "hidden writing". Used in various forms for thousands of years. Steganography method is a method that inserts information into other data without destroying the data. Of course, using this steganography will not arouse the suspicion of other parties who are not entitled to receive information.


2021 ◽  
Vol 21 (3) ◽  
pp. 97-107
Author(s):  
Nadia A. Mohsin ◽  
Huda A. Alameen

Abstract In this research a new method for increasing the embedding capacity in images based on the edge area is proposed. The new approach combines Canny and Prewitt edge detection techniques using OR binary operation. The secret message is concealed using the Least Significant Bit (LSB) method. Embedding capacity, PSNR, SSIM, and MSE values are used as evaluation metrics. Based on the resulted values, the proposed method showed higher embedding capacity while keeping the PSNR, SSIM, MSE values without major changes of other methods which means keeping the imperceptibility quality of the stego image.


2022 ◽  
pp. rapm-2021-103183
Author(s):  
Guy Feigin ◽  
Ning Nan Wang ◽  
Vitaliano Di Grazia ◽  
Philip Peng

IntroductionCoccydynia is a multifactorial complex clinical challenge. A multimodal approach with both conservative measures and procedural interventions is often recommended. We described a novel approach of radiofrequency (RF) ablation for the management of coccydynia.MethodsThree patients with known history of coccydynia refractory to conservative therapy were referred to our clinic. All received different types of RF ablation before: one with anterior bipolar lesion with no analgesia benefit, one with posterior stripped lesion with good benefit but only after 8 weeks of pain flare and one received anterior monopolar lesion with 50% pain reduction for 2–3 months. All subjects underwent a novel RF ablation to the anterior surface of the sacrococcygeal and intercoccygeal joints with two bipolar lesions using multi-tined needles under fluoroscopy guidance. One bipolar lesion was between two needles: one in the sacrococcygeal and another in the intercoccygeal (between first and second coccyx) joints. Another bipolar lesion was between needles on both side of the sacrococcygeal joint.ResultsAll experienced at least 65% pain relief for 6 months. The sitting endurance increased from less than 5 min to an average of 70 min. No adverse effect was observed in two and in the patient who used to have pain flare after lesioning, the pain flare lasted only for 2 weeks.DiscussionThe configuration of the two bipolar lesions with multi-tined needles in this case series stimulates the thinking of new approach for the ablation technique for pain from coccyx. Further prospective large case cohort study is needed.


2009 ◽  
Vol 31 (3) ◽  
pp. 227-233
Author(s):  
Emilia Fransvea ◽  
Angelo Paradiso ◽  
Salvatore Antonaci ◽  
Gianluigi Giannelli

Background: Hepatocellular carcinoma (HCC) poses a major challenge because of the extreme variability of the clinical outcome, which makes it difficult to properly stage the disease and thereby estimate the prognosis. There is growing evidence that this heterogeneous clinical behavior is attributable to several different biological pathways. A novel approach to mapping these differences is by investigating the epigenetics associated with certain clinical aspects.Design: Herein, the relevance of these molecular differences in combination with the biological and molecular pathways regulating the clinical outcome will be discussed. Use of a mechanistic and pathogenic approach to clarify the natural history of HCC is not just an academic speculation but should help to develop new therapies and to tailor these therapies to each individual patient.Conclusion: New biological therapies targeting components of the tumoral or peritumoral microenvironment are crucial to the fight against HCC. However, biological redundancies and the presence of several growth factors, hormones, cytokines, etc., potentially involved in HCC tumor progression make it difficult to assess the best target. Sorafenib, a multi-tyrosine kinase inhibitor, blocks the functions of different growth factors present in the tissue microenvironment. The use of Sorafenib in patients with HCC offers a new approach to the therapy of this disease, stimulating research focusing on the development of drugs based on new molecular and pathogenic insights.


2008 ◽  
Vol 39-40 ◽  
pp. 129-134
Author(s):  
Adrian Volceanov

Basicity of glass is still a challenge in spite of various attempts to measure or calculate it. The values assigned for basicity of glasses, either calculated or experimentally determined, are not always in full agreement with actual facts, and discrepancies among the theoretical ones are not unusual. For instance, SiO2 is described by a single basicity value even if the polymorphs of SiO2 are quite different. Only few attempts were made to face this challenge. Present paper deals with a novel approach on theoretical ionicity / basicity based on electronic energy levels or band structure of solids. Another major adjustment takes into account the possibility of decomposing ionicity of complex chemical bondings into a sum of binary bondings. Considering the distribution of the interbonding angles specific for vitreous systems, it is possible to estimate both a local ionicity (basicity) of bondings and a global (mean) basicity of glass. The variation of basicity (ionicity) with temperature is also presented, this finding being able to open a new view on thermal history of glass considered through chemical character of bondings.


2020 ◽  
pp. 1-16
Author(s):  
David Faflik

This book rests upon a pair of related propositions that have far-reaching consequences for the work of urban studies. The first is that the history of the modern city is a history of urban forms. The second is that the interpretive turn to formalism represents a wholly new approach to thinking about urbanism and historicism. In other words, this book argues that to conceive of the city “formally” is not only to revise our understanding of the city’s actual existence. It is to argue for an alternative way of apprehending the conditions through which knowledge of the city is even possible. Forms alter our sense of what the historical city was. Forms change how we perceive the very practice of urban perception, whether we’re talking about the perceptual habits of historical observers from the past or anyone who is mindful, today, of how forms function in the present century. In the final analysis, the twin claims on which this book depends suggest a different kind of urban being even as they propose a novel approach to city “reading.” In forms, we’ll never know the city the same way again.


Author(s):  
Vivek Sharma S ◽  
Monika Raj ◽  
Swathi S

Phishing is that the most typical and most dangerous attack among cybercrimes. The aim of these attacks is to steal the data that’s utilized by people and organizations to perform transactions or any vital info. The goal of this is often to perform an Extreme Learning Sending encrypted messages frequently will draw the attention of third parties, i.e. hackers, perhaps causing attempts to break and reveal the original messages. In a digital world, steganography is introduced to hide the existence of the communication by concealing a secret message inside another unsuspicious message. This paper presents an overview of text steganography and a brief history of steganography along with various existing text-based steganography techniques.


Sign in / Sign up

Export Citation Format

Share Document