A new approach of text steganography based on mathematical model of number system

In today's world the art of sending & displaying hidden information especially in public places, has received much attention and faced many challenges. Therefore, different methods have been proposed so far for hiding information in various cover media. Steganography is the method to hide a message inside another message without drawing any suspicion to others so that the message can only be detected by its intended recipient. With other steganography methods such as Image, Audio, Video, a number of text steganography algorithms have been introduced. This paper presents a new approach for steganography where introduced a new approach of using a new kind of number system for Steganography through a directed weighted graph cover media.

[1]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[2]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[3]  Merrill Warkentin,et al.  Steganography and Steganalysis , 2006 .

[4]  Jean-Luc Dugelay,et al.  A guide tour of video watermarking , 2003, Signal Process. Image Commun..

[5]  Ajay Jadhav,et al.  Steganography An Art of Hiding Data , 2009, ArXiv.

[6]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[7]  Kaliappan Gopalan Audio steganography using bit modification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[8]  Tung-Shou Chen,et al.  A new data hiding method in binary image , 2003, Fifth International Symposium on Multimedia Software Engineering, 2003. Proceedings..

[9]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[10]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[11]  Kyung-Ae Moon,et al.  A text watermarking algorithm based on word classification and inter-word space statistics , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..

[12]  Mohammad Shirali Shahreza An improved method for steganography on mobile phone , 2005 .

[13]  T. Scharping Hide-and-seek: China's elusive population data , 2001 .

[14]  Jean-Luc Dugelay,et al.  Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.

[15]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[16]  Adnan M. Alattar,et al.  Watermarking electronic text documents containing justified paragraphs and irregular line spacing , 2004, IS&T/SPIE Electronic Imaging.

[17]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[18]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[19]  J C Judge,et al.  Steganography: Past, Present, Future , 2001 .

[20]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[21]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[22]  J. Krenn,et al.  Steganography and Steganalysis , 2006 .