Text Steganography Based on Parallel Encryption Using Cover Text (PECT)

This paper presents a self-checking text steganography which could be used efficiently where large data is involved in various IoT applications. The space complexity of its cover text is one-fourth of its message size which is very less as compared to other techniques. The cover text of this method is generated from the private message itself. Later it is used to check the correctness of the data on receiver side. This helps to reduce the time overhead in case of corruption of any part of the data. Thus, the security and trust issues of IoT are easily handled even on high traffic channels.

[1]  M. Shirali-Shahreza,et al.  Text Steganography by Changing Words Spelling , 2008, 2008 10th International Conference on Advanced Communication Technology.

[2]  Lingyun Xiang,et al.  Research on Steganalysis for Text Steganography Based on Font Format , 2007 .

[3]  Monika Agarwal Text Steganographic Approaches: A Comparison , 2013, ArXiv.

[4]  Md. Khairullah A Novel Text Steganography System Using Font Color of the Invisible Characters in Microsoft Word Documents , 2009, 2009 Second International Conference on Computer and Electrical Engineering.

[5]  Young Shik Moon,et al.  An Effective Method for Eye Detection Based on Texture Information , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[6]  Mohammad Hassan Shirali-Shahreza,et al.  A New Synonym Text Steganography , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[7]  M. Shirali-Shahreza,et al.  Text Steganography in SMS , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[8]  Maninder Singh Nehra,et al.  ECR (encryption with cover text and reordering) based text steganography , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).

[9]  Tarun Kumar,et al.  A Capital Shape Alphabet Encoding(CASE) Based Text Steganography , 2013 .

[10]  N. C. Debnath,et al.  Linguistic approach for text steganography through Indian text , 2010, 2010 2nd International Conference on Computer Technology and Development.