Computer Science – Cryptography and Security
Scientific paper
2012-03-16
International Journal of Network Security & Its Applications (IJNSA), Vol 3, Issue 6, pp. 213-225, ISSN: Online - 0974 - 9330,
Computer Science
Cryptography and Security
13 pages
Scientific paper
As is commonly known, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders to protect the data from the prying eyes. However, using text as the target medium is relatively difficult as compared to the other target media, because of the lack of available redundant information in a text file. In this paper, in the backdrop of the limitations in the prevalent text based steganographic approaches, we propose simple, yet novel approaches that overcome the same. Our approaches are based on combining the random character sequence and feature coding methods to hide a character. We also analytically evaluate the approaches based on metrics viz. hiding strength, time overhead and memory overhead entailed. As compared to other methods, we believe the approaches proposed impart increased randomness and thus aid higher security at lower overhead.
Dasgupta Aroop
Dulera Shraddha
Jinwala Devesh
No associations
LandOfFree
Experimenting with the Novel Approaches in Text Steganography has received 1 rating(s) and 1 review(s), resulting in an average rating of 5.00 on a scale from 1 to 5. The overall rating for this scientific paper is superior.
If you have personal experience with Experimenting with the Novel Approaches in Text Steganography, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Experimenting with the Novel Approaches in Text Steganography will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-350619