A Novel Approach of Text Steganography using Nonlinear Character Positions (NCP)

Full Text (PDF, 269KB), PP.55-60

Views: 0 Downloads: 0

Author(s)

Sabyasachi Samanta 1,* Saurabh Dutta 2 Goutam Sanyal 3

1. Haldia Institute of Technology, Haldia, WB, INDIA

2. B. C. Roy Engineering College, Durgapur, WB, INDIA

3. National Institute of Technology, Durgapur, WB, INDIA

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2014.01.08

Received: 15 May 2013 / Revised: 2 Aug. 2013 / Accepted: 16 Sep. 2013 / Published: 8 Nov. 2013

Index Terms

Text steganography, Nonlinear character position (NCP), Security, Data hiding

Abstract

Usually, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders and to protect the data from the prying eyes. This paper presents a survey of text steganography method used for    hiding secret information inside some cover text. Here the text steganography algorithms based on modification of font format, font style et cetera, has advantages of great capacity, good imperceptibility and wide application range. The nonlinear character positions of different pages are targeted through out the cover with insignificant modification.  As compared to other methods, we believe that the approaches proposed convey superior randomness and thus support higher security.

Cite This Paper

Sabyasachi Samanta, Saurabh Dutta, Goutam Sanyal, "A Novel Approach of Text Steganography using Nonlinear Character Positions (NCP)", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.1, pp.55-60, 2014. DOI:10.5815/ijcnis.2014.01.08

Reference

[1]M. Grace Vennice, Prof. Tv. Rao, M. Swapna, Prof. J. Sasi kiran “Hiding the Text Information using Stegnography “, International Journal of Engineering Research and Applications (IJERA), ISSN: 2248-9622, Vol. 2, Issue 1, Jan-Feb 2012, pp.126-131.
[2]Herman Kabetta, B. Yudi Dwiandiyanta, Suyoto, “Information Hiding in CSS: A Secure Scheme Text-Steganography using Public Key Cryptosystem”, International Journal on Cryptography and Information Security (IJCIS), Vol.1, No.1, December 2011, pp 13-22.
[3]Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay and Tai-hoon Kim “Text Steganography: A Novel Approach”, International Journal of Advanced Science and Technology Vol. 3, February, 2009, pp. 79 – 86.
[4]Adnan Abdul-Aziz Gutub, Manal Mohammad Fattani, “A Novel Arabic Text Steganography Method Using Letter Points and Extensions”, World Academy of Science, Engineering and Technology 27 2007, pp. 28-32.
[5]Md. Khairullah, “A Novel Text Steganography System in Cricket Match Scorecard”, International Journal of Computer Applications (0975 – 8887) Volume 21– No.9, May 2011, pp. 43-47.
[6][6] Souvik Bhattacharyya , Indradip Banerjee, Gautam Sanyal , “A Novel Approach of Secure Text Based Steganography Model using Word Mapping Method(WMM)” International Journal of Computer and Information Engineering 4:2 2010, pp. 96-103.
[7]Sabyasachi Samanta, Saurabh Dutta, Goutam Sanyal, “An Enhancement of Security on Image Applying Asymmetric Key Algorithm”, International Journal of Computer Applications (0975 – 8887), Volume 25– No.5, July 2011, pp. 19-23.
[8]Atif Bin Mansoor, Zohaib Khan, Shoab Ahmed Khan, “ CRYPTO-STEG: A Hybrid Cryptology – Steganography Approach for Improved Data Security”, Mehran University Research Journal of Engineering & Technology, Volume 31, No. 2, April, 2012 [ISSN 0254-7821], pp. 219-226.
[9]Shraddha Dulera, Devesh Jinwala, Aroop Dasgupta, “Experimenting with the Novel Approaches in Text Steganography”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 pp. 213-225.
[10]V. Lokeswara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy, “Implementation of LSB Steganography and its Evaluation for Various File Formats”, International Journal Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872.
[11]Dr. Ekta Walia, Payal Jain, An Analysis of LSB & DCT based Steganography”, Global Journal of Computer Science and Technology, Vol. 10, Issue 1 (Ver 1.0), April 2010, pp. 4-8.
[12]Tu-Thach Quach, “Optimal Cover Estimation Methods and Steganographic Payload Location”, IEEE Transactions On Information Forensics And Security, Vol. 6, No. 4, December 2011, pp. 1214-1222.
[13]Rongyue Zhang, Vasiliy Sachnev, Magnus Bakke Botnan, Hyoung Joong Kim, Jun Heo, “An Efficient Embedder for BCH Coding for Steganography”, IEEE Transactions on Information Theory, Vol. 58, No. 12, December 2012, pp.7272-7279.
[14]Chunfang Yang, Fenlin Liu, Xiangyang Luo, And Ying Zeng, “Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography” IEEE Transactions on Information Forensics and Security, Vol. 8, No. 1, January 2013, pp. 216-228.
[15]Yedla Dinesh, Addanki Purna Ramesh, “Efficient Capacity Image Steganography by Using Wavelets”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622, Vol. 2, Issue 1, Jan-Feb 2012, pp.251-259.
[16]Atallah M. Al-Shatnawi, “A New Method in Image Steganography with Improved Image Quality”, Applied Mathematical Sciences, Vol. 6, 2012, pp. 3907 – 3915.
[17]ak, #mum cryptolabs, “On the 2ROT13 Encryption Algorithm”, April 1, 2005, pp. 1-4.
[18]Himanshu Gupta, Vinod Kumar Sharma, “Role of Multiple Encryption in Secure Electronic Transaction”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011, pp. 89-96.
[19]Pranam Paul, Saurabh Dutta, A K Bhattacharjee, “An Approach to ensure Security through Bit-level Encryption with Possible Lossless Compression”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2, February 2008, pp. 291-299.
[20]Monika Agrawal, Pradeep Mishra , “A Comparative Survey on Symmetric Key Encryption Techniques” , International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, pp. 877-882.
[21]Akanksha Mathur, “A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms”, International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 09 Sep 2012 pp. 1650-1657.
[22]Zaidoon Kh. AL-Ani, A. A. Zaidan, B. B. Zaidan, Hamdan O. Alanazi, “Overview: Main Fundamentals for Steganography “, Journal of Computing, Volume 2, Issue 3, March 2010, ISSN 2151-9617, pp. 158-165.
[23]Monika Agrawal, Pradeep Mishra , “A Comparative Survey on Symmetric Key Encryption Techniques” , International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, pp. 877-882.
[24]Akanksha Mathur, “A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms”, International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 09 Sep 2012 pp. 1650-1657.
[25]Mrs. Kavitha, Kavita Kadam, Ashwini Koshti, Priya Dunghav, ”Steganography Using Least Significant Bit Algorithm”, “International Journal of Engineering Research and Applications (IJERA)” ISSN: 2248-9622, Vol. 2, Issue 3, May-Jun 2012, pp. 338-341.