Abstract

This paper presents three novel approaches of text steganography. The first approach uses the theme of missing letter puzzle where each character of message is hidden by missing one or more letters in a word of cover. The average Jaro score was found to be 0.95 indicating closer similarity between cover and stego file. The second approach hides a message in a wordlist where ASCII value of embedded character determines length and starting letter of a word. The third approach conceals a message, without degrading cover, by using start and end letter of words of the cover. For enhancing the security of secret message, the message is scrambled using one-time pad scheme before being concealed and cipher text is then concealed in cover. We also present an empirical comparison of the proposed approaches with some of the popular text steganographic approaches and show that our approaches outperform the existing approaches.

Highlights

  • Steganography is derived from a finding by Johannes Trithemus (1462-1516) entitled “Steganographia” and comes from the Greek words meaning “covered writing” [1, 2, 3]

  • This paper presents three novel approaches of text steganography

  • The first approach uses the theme of missing letter puzzle and hides each character of secret message in a word by missing one or two letters in that word depending on the ASCII value of the embedded character

Read more

Summary

Introduction

Steganography is derived from a finding by Johannes Trithemus (1462-1516) entitled “Steganographia” and comes from the Greek words (στεγανό-ς, γραφ-ειν) meaning “covered writing” [1, 2, 3]. Cryptography and Steganography are ways of secure data transfer over the Internet. Limitation of cryptography is that the third party is always aware of the communication because of the unintelligible nature of the text. Steganography overcomes this limitation by hiding message in an innocent looking object called cover. The text to be concealed is called embedded data. A stego-key is used to control the hiding process so as to restrict detection and/or recovery of embedded data to the parties who know it [1]. The stego object is an object we get after hiding the embedded data in a cover medium

Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.