• DocumentCode
    1773306
  • Title

    Developing an efficient solution to information hiding through text steganography along with cryptography

  • Author

    Uddin, Md Palash ; Saha, Mousumi ; Ferdousi, Syeda Jannatul ; Ibn Afjal, Masud ; Marjan, Md Abu

  • Author_Institution
    Hajee Mohammad Danesh Sci. & Technol. Univ. (HSTU), Dinajpur, Bangladesh
  • fYear
    2014
  • fDate
    21-23 Oct. 2014
  • Firstpage
    14
  • Lastpage
    17
  • Abstract
    Now-a-days information security over unsecured communication channel is one of the most challenging issues. Cryptography and steganography, a sub-discipline of information hiding, are two distinct popular security offering techniques. To get the combined chemistry from these techniques, today´s real-time security systems include both cryptography and steganography in their working principle. To cope up with those systems, we have proposed a format-based pure text steganography algorithm including a private key cryptography providing a higher level of security. The cover text has been made as ordinary as possible. After successful embedding of the secret message into the cover text, the stego-text also looks like an ordinary text because only an alphanumeric puzzle is added at the end of the cover text to make up the stego-text. This final stego-text is sent to the receiver through the unsecured communication channel. Instead of correct recipient, if any third party or cracker or hacker obtains the stego-text, they may think that it is an ordinary text to teach English to the kids since we made it like that or if they try to extract the original message, it requires a huge amount of computational time. The proposed algorithm supersedes various text steganographic techniques through combining both cryptography and steganography.
  • Keywords
    data encapsulation; private key cryptography; steganography; alphanumeric puzzle; format-based pure text steganography algorithm; information hiding; information security; private key cryptography; real-time security systems; security offering techniques; stego-text; text steganography; unsecured communication channel; Arrays; Communication channels; Computer science; Encryption; Receivers; Concealing of message; Embedding and Extraction; Higher Level of Security; Information Hiding; Text Steganography;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Strategic Technology (IFOST), 2014 9th International Forum on
  • Conference_Location
    Cox´s Bazar
  • Print_ISBN
    978-1-4799-6060-6
  • Type

    conf

  • DOI
    10.1109/IFOST.2014.6991061
  • Filename
    6991061