Abstract

Steganography is the science of hiding certain messages (data) in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text) in another text (cover text) so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG) method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

Highlights

  • Exchanging hidden information is an important domain of information security which includes different methods such as cryptography, steganography, etc

  • The aim of this paper is to describe a new method for text steganography through text and proposed a novel steganography technique for Arabic language called “Blood Group” stenographic method

  • A hybrid method that combines both cryptography and steganography is considered in this paper

Read more

Summary

Introduction

Exchanging hidden information is an important domain of information security which includes different methods such as cryptography, steganography, etc. [1]. Steganography is a newfangled approach of securing messages from outside interference/attacks in an exceptional way. This technique provides a way that anticipated recipient recognizes the subsistence of the message(s). This is just obscuring a file, message, image, or video within another. Steganography is a way of covering a message surrounded by an extra message, so that nobody can have a notion of its presence. In steganography the information is concealed in the cover media so no person observes the presence of the secret information. The working of steganography has been implemented on different medias like text, video, images, and sounds [2]

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.