Abstract

<p class="0abstract">The widespread adoption of electronic distribution of material is accompanied by illicit copying and distribution. This is why individuals, businesses and governments have come to think of how to protect their work, prevent such illicit activities and trace the distribution of a document. It is in this context that a lot of attention is being focused on steganography. Implementing steganography in text document is not an easy undertaking considering the fact that text document has very few places in which to embed hidden data. Any minute change introduced to text objects can easily be noticed thus attracting attention from possible hackers. This study investigates the possibility of embedding data in text document by employing the entropy rate of the constituent characters of words not less than four characters long. The scheme was used to embed bits in text according to the alphabetic structure of the words, the respective characters were compared with their neighbouring characters and if the first character was alphabetically lower than the succeeding character according to their ASCII codes, a zero bit was embedded otherwise 1 was embedded after the characters had been transposed. Before embedding, the secret message was encrypted with a secret key to add a layer of security to the secret message to be embedded, and then a pseudorandom number was generated from the word counts of the text which was used to paint the starting point of the embedding process. The embedding capacity of the scheme was relatively high compared with the space encoding and semantic method.</p>

Highlights

  • The introduction of computers and, for that matter, information technology has caused the problem of information sharing and data exchange to drastically reduce

  • The field of steganography has generated a lot of interest both in the academic and industrial arenas considering its potential in enabling secret communication and for that matter secret data exchange between consenting parties

  • A lot of investigation has gone into and continues to go on in this field, the volume of work done in text steganography is quite restricted compared with other digital media domains

Read more

Summary

Introduction

The introduction of computers and, for that matter, information technology has caused the problem of information sharing and data exchange to drastically reduce. Digital data such as document, video, audio and images are easy to edit or manipulate and transfer and at low cost over the internet to other users both authorized and unauthorized. This tends to cause a lot of financial loss and judicial litigation that could drag on endlessly. Hard-copy text can be treated as a highly structured image and is readily amenable to a variety of techniques such as slight variations in letter forms, kerning, baseline, etc This is due largely to the relative lack of redundant information in a text file compared with a picture or a sound byte. This work seeks to explore that scope by examining the embedding capacity, robustness and imperceptibility of the embedding method employing the entropy properties of English n-grams

Theoretical Context
Proposed Algorithm
Analysis
Conclusion
Author

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.