Bengali steganography using CALP with a novel bengali word processor

Recent years have witnessed the rapid development of the Internet and telecommunication techniques. Steganography is the art and science of communicating in a way which hides the existence of the communication. Considerable amount of work has been carried out by different researchers on steganography. In this work the authors propose a novel text steganography method for Bengali text generated through a new approach of Bengali text processor. Considering the structure of Bengali alphabet, secret message has been hidden through changing the pattern of Bengali alphabet letters. This approach uses the idea of structural and feature changing of the cover carrier which is visibly indistinguishable from the original to the human beings and may be modified for other India language also.

[1]  M. Shirali-Shahreza,et al.  Text Steganography by Changing Words Spelling , 2008, 2008 10th International Conference on Advanced Communication Technology.

[2]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[3]  M.H. Shirali-Shahreza,et al.  Text Steganography in chat , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.

[4]  Kaliappan Gopalan Audio steganography using bit modification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[5]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[6]  Adnan M. Alattar,et al.  Watermarking electronic text documents containing justified paragraphs and irregular line spacing , 2004, IS&T/SPIE Electronic Imaging.

[7]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[8]  William A. Brenneman Statistics for Research , 2005, Technometrics.

[9]  Ayan Biswas,et al.  Text Steganography using CALP with High Embedding Capacity , 2011 .

[10]  Souvik Bhattacharyya,et al.  A Novel Approach to Develop a Secure Image based Steganographic Model using Integer Wavelet Transform , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[11]  I. Daubechies,et al.  Wavelet Transforms That Map Integers to Integers , 1998 .

[12]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[13]  Ayan Biswas,et al.  Hiding Data in Text Through Changing in Alphabet Letter Patterns (CALP) , 2011 .

[14]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[15]  William E. Winkler,et al.  The State of Record Linkage and Current Research Problems , 1999 .

[16]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[17]  Kyung-Ae Moon,et al.  A text watermarking algorithm based on word classification and inter-word space statistics , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..

[18]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[19]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[20]  Matthew A. Jaro,et al.  Advances in Record-Linkage Methodology as Applied to Matching the 1985 Census of Tampa, Florida , 1989 .

[21]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[22]  Jean-Luc Dugelay,et al.  A guide tour of video watermarking , 2003, Signal Process. Image Commun..

[23]  Yang Xia Construction of Second Generation Wavelets , 2000 .

[24]  Marc Rennhard,et al.  A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography , 2001, ISC.

[25]  Dale K. Pace,et al.  The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .

[26]  Sushil Jajodia,et al.  Information hiding: steganography, attacks, and countermeasures , 2000 .

[27]  Jean-Luc Dugelay,et al.  Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.

[28]  Matthew A. Jaro,et al.  Probabilistic linkage of large public health data files. , 1995, Statistics in medicine.

[29]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[30]  D. Kahn The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1967 .

[31]  Adnan Abdul-Aziz Gutub,et al.  A Novel Arabic Text Steganography Method Using Letter Points and Extensions , 2007 .