A Novel Approach of Text Steganography using Nonlinear Character Positions (NCP)

Usually, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders and to protect the data from the prying eyes. This paper presents a survey of text steganography method used for hiding secret information inside some cover text. Here the text steganography algorithms based on modification of font format, font style et cetera, has advantages of great capacity, good imperceptibility and wide application range. The nonlinear character positions of different pages are targeted through out the cover with insignificant modification. As compared to other methods, we believe that the approaches proposed convey superior randomness and thus support higher security.

[1]  Atallah M. Al-Shatnawi A New Method in Image Steganography with Improved Image Quality , 2012 .

[2]  Tu-Thach Quach,et al.  Optimal Cover Estimation Methods and Steganographic Payload Location , 2011, IEEE Transactions on Information Forensics and Security.

[3]  Ekta Walia,et al.  An Analysis of LSB & DCT based Steganography , 2010 .

[4]  Saurabh Dutta,et al.  An Enhancement of Security on Image Applying Asymmetric Key Algorithm , 2011 .

[5]  Shoab A. Khan,et al.  CRYPTO-STEG: A Hybrid Cryptology - Steganography Approach for Improved Data Security , 2012 .

[6]  Akanksha Mathur A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms , 2012 .

[7]  Ying Zeng,et al.  Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography , 2013, IEEE Transactions on Information Forensics and Security.

[8]  Khairullah A Novel Text Steganography System in Cricket Match Scorecard , 2011 .

[9]  Hyoung Joong Kim,et al.  An Efficient Embedder for BCH Coding for Steganography , 2012, IEEE Transactions on Information Theory.

[10]  Suyoto,et al.  Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem , 2012, ArXiv.

[11]  Adnan Abdul-Aziz Gutub,et al.  A Novel Arabic Text Steganography Method Using Letter Points and Extensions , 2007 .

[12]  Devesh C. Jinwala,et al.  Experimenting with the Novel Approaches in Text Steganography , 2012, ArXiv.

[13]  Saurabh Dutta,et al.  An Approach to ensure Security through Bit-level Encryption with Possible Lossless Compression , 2008 .

[14]  Himanshu Gupta,et al.  ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION , 2011 .

[15]  B. B. Zaidan,et al.  Overview: Main Fundamentals for Steganography , 2010, ArXiv.

[16]  Tai-hoon Kim,et al.  Text Steganography: A Novel Approach , 2009 .

[17]  V. L. Reddy,et al.  Implementation of LSB Steganography and its Evaluation for Various File Formats , 2011 .