Novel Text Steganography through Special Code Generation

Encrypted messages sending frequently draws the attention of third parties, perhaps causing attempts to break and reveal the original messages. Steganography is introduced to hide the existence of the communication by concealing a secret message in an appropriate carrier like text, image, audio or video. Steganography is of Greek origin and means "Covered or hidden writing". The carrier can be sent to a receiver without any one except the authenticated receiver only knows existence of the information. Steganography is often being used together with cryptography and offers an acceptable amount of privacy and security over the communication channel. It is an emerging area which is used for secured data transmission over any public media. In this paper, a novel text based steganography technique based on the use of indefinite articles 'a' or 'an' in conjunction with the non-specific or non-particular nouns in English language have been proposed. The authors also introduced a new code representation technique (SSCE - Secret Steganography Code for Embedding) at both ends in order to achieve high level of security. Before the embedding operation each character of the secret message has been converted to SSCE Value and then embeds to cover text. Finally stego text is formed and transmits to the receiver side. At the receiver side different reverse operation has been carried out to get back the original information.

[1]  Jean-Luc Dugelay,et al.  A guide tour of video watermarking , 2003, Signal Process. Image Commun..

[2]  Lawrence O'Gorman,et al.  Electronic Marking and Identification Techniques to Discourage Document Copying , 1995, IEEE J. Sel. Areas Commun..

[3]  Dale K. Pace,et al.  The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .

[4]  William E. Winkler,et al.  The State of Record Linkage and Current Research Problems , 1999 .

[5]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[6]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[7]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[8]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[9]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[10]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[11]  D. Kahn The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1967 .

[12]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[13]  Goutam Sanyal,et al.  Design and implementation of a Secure Text Based Steganography Model , 2010, Security and Management.

[14]  Andrew Pyle The father of modern science? Stephen Gaukroger Francis , 2002, The Lancet.

[15]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[16]  Jean-Luc Dugelay,et al.  Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.

[17]  J F MCMANUS,et al.  Galileo Galilei , 1965, Nature.

[18]  Souvik Bhattacharyya,et al.  A Novel Approach to Develop a Secure Image based Steganographic Model using Integer Wavelet Transform , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[19]  L. Marvel Information Hiding: Steganography and Watermarking , 2005 .

[20]  Matthew A. Jaro,et al.  Probabilistic linkage of large public health data files. , 1995, Statistics in medicine.