DocumentCode
1773306
Title
Developing an efficient solution to information hiding through text steganography along with cryptography
Author
Uddin, Md Palash ; Saha, Mousumi ; Ferdousi, Syeda Jannatul ; Ibn Afjal, Masud ; Marjan, Md Abu
Author_Institution
Hajee Mohammad Danesh Sci. & Technol. Univ. (HSTU), Dinajpur, Bangladesh
fYear
2014
fDate
21-23 Oct. 2014
Firstpage
14
Lastpage
17
Abstract
Now-a-days information security over unsecured communication channel is one of the most challenging issues. Cryptography and steganography, a sub-discipline of information hiding, are two distinct popular security offering techniques. To get the combined chemistry from these techniques, today´s real-time security systems include both cryptography and steganography in their working principle. To cope up with those systems, we have proposed a format-based pure text steganography algorithm including a private key cryptography providing a higher level of security. The cover text has been made as ordinary as possible. After successful embedding of the secret message into the cover text, the stego-text also looks like an ordinary text because only an alphanumeric puzzle is added at the end of the cover text to make up the stego-text. This final stego-text is sent to the receiver through the unsecured communication channel. Instead of correct recipient, if any third party or cracker or hacker obtains the stego-text, they may think that it is an ordinary text to teach English to the kids since we made it like that or if they try to extract the original message, it requires a huge amount of computational time. The proposed algorithm supersedes various text steganographic techniques through combining both cryptography and steganography.
Keywords
data encapsulation; private key cryptography; steganography; alphanumeric puzzle; format-based pure text steganography algorithm; information hiding; information security; private key cryptography; real-time security systems; security offering techniques; stego-text; text steganography; unsecured communication channel; Arrays; Communication channels; Computer science; Encryption; Receivers; Concealing of message; Embedding and Extraction; Higher Level of Security; Information Hiding; Text Steganography;
fLanguage
English
Publisher
ieee
Conference_Titel
Strategic Technology (IFOST), 2014 9th International Forum on
Conference_Location
Cox´s Bazar
Print_ISBN
978-1-4799-6060-6
Type
conf
DOI
10.1109/IFOST.2014.6991061
Filename
6991061
Link To Document