Information hiding through dynamic text steganography and cryptography: Computing and Informatics

Over the last decade, there has been a constant increase in the accessibility and utility of the Internet. More number of people are tending towards the use of mobile applications, E-mails, E-commerce and social networking sites. In this scenario, even the most confidential information travels through unsecured channels. Hence, it becomes crucial to ensure the security of the data being exchanged. This paper explores an efficient method of secure data transmission through information hiding which includes text steganography and cryptography. The proposed methodology was built on top of the result of the Data Encryption Standard (DES), a symmetric key algorithm used for cryptography. The concept of data hiding is realized using text steganography i.e. a secret message is concealed within another text. The text used to hide the sensitive information was constructed dynamically and did not reveal the presence of any secret data. It can be concluded that the combination of these two cryptographic techniques provides an efficient solution for information hiding and data transmission through unsecured channels.

[1]  Rahul Sharma,et al.  XORSTEG: A new model of text steganography , 2016, 2016 International Conference on Communication and Electronics Systems (ICCES).

[2]  A. J. Raphael,et al.  Cryptography and Steganography – A Survey , .

[3]  Suvamoy Changder,et al.  A Novel Approach for Text Steganography: Generating Text Summary Using Reflection Symmetry☆ , 2013 .

[4]  조위덕 Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.

[5]  Dilip Kumar Yadav,et al.  A Novel Approach to Text Steganography Using Font Size of Invisible Space Characters in Microsoft Word Document , 2013, ICACNI.

[6]  Narayan C. Debnath,et al.  A Greedy Approach to Text Steganography Using Properties of Sentences , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[7]  Peter van Emde Boas,et al.  Preserving order in a forest in less than logarithmic time , 1975, 16th Annual Symposium on Foundations of Computer Science (sfcs 1975).

[8]  Vineet Agarwal,et al.  A new approach of text steganography based on mathematical model of number system , 2014, 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014].

[9]  C. Shukla A Survey of Steganography Technique, Attacks and Applications , 2014 .

[10]  Masud Ibn Afjal,et al.  Developing an efficient solution to information hiding through text steganography along with cryptography , 2014, 2014 9th International Forum on Strategic Technology (IFOST).

[11]  Sangita Roy,et al.  A novel approach to format based text steganography , 2011, ICCCS '11.

[12]  Shangwei Shi,et al.  An Approach to Text Steganography Based on Search in Internet , 2016, 2016 International Computer Symposium (ICS).

[13]  Terry A. Welch,et al.  A Technique for High-Performance Data Compression , 1984, Computer.

[14]  Muhammad Sher,et al.  Innocuous Communication via HTML Hiding Data in Plain Sight , 2013, Arabian Journal for Science and Engineering.