Text steganography through Indian languages using feature coding method

Steganography is the method to hide a message inside another message without drawing any suspicion to the others and that the message can only be detected by its intended recipient. With the other steganography methods such as Image, Audio, Video, a number of text steganography algorithms have been introduced. This paper presents a new approach for steganography in Indian Languages. Considering the availability of more feature code able characters and flexible grammar structure of Indian Languages this approach is able to hide a secret message in the text. The text, after replacing feature code able characters with the transformed versions, can be used as cover media. Similarly by applying a reverse method to the cover file, we show how easily the secret message can be recovered by the intended receiver.

[1]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[2]  Hong Yan,et al.  Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..

[3]  Mohammad Hassan Shirali-Shahreza,et al.  A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[4]  Kyung-Ae Moon,et al.  A text watermarking algorithm based on word classification and inter-word space statistics , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..

[5]  Jean-Luc Dugelay,et al.  A guide tour of video watermarking , 2003, Signal Process. Image Commun..

[6]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[7]  Merrill Warkentin,et al.  Steganography and Steganalysis , 2006 .

[8]  Narayan C. Debnath,et al.  A New Approach to Hindi Text Steganography by Shifting Matra , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[9]  Zhili Chen,et al.  Linguistic Steganography Detection Based on Perplexity , 2008, 2008 International Conference on MultiMedia and Information Technology.

[10]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[11]  Peter Wayner,et al.  Mimic Functions , 1992, Cryptologia.

[12]  Ajay Jadhav,et al.  Steganography An Art of Hiding Data , 2009, ArXiv.

[13]  Jean-Luc Dugelay,et al.  Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.

[14]  Adnan M. Alattar,et al.  Watermarking electronic text documents containing justified paragraphs and irregular line spacing , 2004, IS&T/SPIE Electronic Imaging.

[15]  J. Krenn,et al.  Steganography and Steganalysis , 2006 .

[16]  Kaliappan Gopalan Audio steganography using bit modification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[17]  Narayan C. Debnath,et al.  New Techniques and Algorithms for Text Steganography through Hindi Text , 2009, SEDE.

[18]  Narayan C. Debnath,et al.  A new approach for steganography in Bengali text , 2009, J. Comput. Methods Sci. Eng..

[19]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[20]  Tung-Shou Chen,et al.  A new data hiding method in binary image , 2003, Fifth International Symposium on Multimedia Software Engineering, 2003. Proceedings..

[21]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[22]  Mark Chapman,et al.  Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.

[23]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[24]  Narayan C. Debnath,et al.  An Approach to Bengali Text Steganography , 2008, SEDE.

[25]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).