Title :
Developing an efficient solution to information hiding through text steganography along with cryptography
Author :
Uddin, Md Palash ; Saha, Mousumi ; Ferdousi, Syeda Jannatul ; Ibn Afjal, Masud ; Marjan, Md Abu
Author_Institution :
Hajee Mohammad Danesh Sci. & Technol. Univ. (HSTU), Dinajpur, Bangladesh
Abstract :
Now-a-days information security over unsecured communication channel is one of the most challenging issues. Cryptography and steganography, a sub-discipline of information hiding, are two distinct popular security offering techniques. To get the combined chemistry from these techniques, today´s real-time security systems include both cryptography and steganography in their working principle. To cope up with those systems, we have proposed a format-based pure text steganography algorithm including a private key cryptography providing a higher level of security. The cover text has been made as ordinary as possible. After successful embedding of the secret message into the cover text, the stego-text also looks like an ordinary text because only an alphanumeric puzzle is added at the end of the cover text to make up the stego-text. This final stego-text is sent to the receiver through the unsecured communication channel. Instead of correct recipient, if any third party or cracker or hacker obtains the stego-text, they may think that it is an ordinary text to teach English to the kids since we made it like that or if they try to extract the original message, it requires a huge amount of computational time. The proposed algorithm supersedes various text steganographic techniques through combining both cryptography and steganography.
Keywords :
data encapsulation; private key cryptography; steganography; alphanumeric puzzle; format-based pure text steganography algorithm; information hiding; information security; private key cryptography; real-time security systems; security offering techniques; stego-text; text steganography; unsecured communication channel; Arrays; Communication channels; Computer science; Encryption; Receivers; Concealing of message; Embedding and Extraction; Higher Level of Security; Information Hiding; Text Steganography;
Conference_Titel :
Strategic Technology (IFOST), 2014 9th International Forum on
Conference_Location :
Cox´s Bazar
Print_ISBN :
978-1-4799-6060-6
DOI :
10.1109/IFOST.2014.6991061