Information Hiding in Text Steganography A Different Approach-2019
Information Hiding in Text Steganography A Different Approach-2019
Abstract—Today's internet world is flooded with huge amount of data which is resulting data leakage and theft of information. Lots
of challenges arise when transferring or receiving various kind of covered data, messages or information especially using the public
networks. Cyber crime one of the biggest imperfection in this fully connected internetworking world. Cyber attacks, phishing attacks,
intruder like third party are always active to hack official, personal or governmental information in the form of a message using this
networks. This is why we introduce the technique namely Steganography, where the tricky message has been hiding the
data/information confidently. Steganography is one of the best techniques for putting out of scene for a message bounded by other
media (cover) as if nothing is there. Here a number system is a cover media and text message hide over this cover media. In this paper
a number of co-ordinates using by the innovative formula which used in an novel way to hide the actual message. The predestined
receiver is always concerned with this algorithm. It can be much realized by the scholars as well as researchers to progress towards a
pioneering area of research for secret message transfer.This work is not a evaluation or enhancement of the earlier works but it is a
altered approach to text Steganography to hide the message. A fantastic combine of number, word to hide information. For developing
the application this paper could be very useful for concealing secret data / information for Central Bureau of Investigation, Defence
Intelligence Agency, Intelligence Bureau (IB) for sake of saving mother land.
Keywords: Steganography, Number system Method, DES Algorithm, Information Hiding
cryptography. Reversely without any doubt it can be said of the character which is to be hidden the length of the
that apart from others, steganography portray further words depends on, the words are generated energetically.
concentration [8,10]. As we steganography is a process of There is no cover file which is pre-arranged. The
fine art by putting sensitive data out of vision and science technique is designed in such a way that without the cover
of overshadowing information so that the presence of the medium the steganography file is formed.
data can ‘t be recognized [11].
III. PROPOSED ALGORITHM AND TECHNICAL
II. PREVIOUS EFFORT BACKGROUND
In this section with the help of their advantages and as In this paper our cover media is a number system where
well as disadvantages various attempts are taken here to hiding a secrete message inside the text. Every number
describe this information hiding system. system requires working on the digits to find ultimate
value. In the same way to get the ending value in this
A. GA Applying on Alphabet–Based Techniques system also operates on digits but in some way the
In this paper to fortify the stego text from third party the calculation is different [14]. The number like 120 of
author have concentrate on Genetic Algorithm. Most of decimal is written as (14, 15) in this system. And the
the time it is been noticed that a doubtful stego which is calculation is done by the formula ((α* (α + 1) / 2) + β) for
produced from the generated stego text can be measured an ordered pair (α, β). Where α = 14 and β = 15. So the
by Jaro–Winkler–Measurement [12,18]. Many analyst final value is ((14 * 15) / 2) + 15 = ((7 * 15) + 15) = 105 +
concentrate on video, audio and image steganography but 15 = 120. Here every factor like α and β are treated as
in compared to others GA imparts optimize solution. With decimal. Now this is a concept where counting is done is
comparing to a video steganography it takes less memory different way [15, 16].
for communication. Here the division is done in a different way in my
system. In this system we consider any quantity of a
B. Semantic Application commodity and the counting start as,
In semantic scheme, we can hide any information within Proposed Number System:-
the text with the help of the words synonyms of a
Number in
particular words. The first and the foremost priority of the Group
Group
Group Element
scheme is to protect the information and as well as to 1 1 (1)
improve it also [8]. It can be violated in case of retyping or 2 2 (2,3)
using OCR program. Any how the significant of the 3 3 (4,5,6)
documentation make change[13]. 4 4 (7,8,9,10)
5 5 (11,12,13,14,15)
C. Feature Coding 6 6 (16,17,18,19,20,21)
(22,23,24,25,26,27,
7 7
With the help of this method some character in between 28)
the text can be changed. As for example, by shortened or …….. ……. …….
…….. ……. …….
elongated the last part of some character like m,r,e or so
(92,93,94,95,96,97,
on hiding information in text can be done [8,11]. In this 14 14 98,99,100,101,102,
procedure a enlarge volume of data is kept overshadow in 103,104,105)
the text without putting the reader aware of the existence (106,107,108,109,1
of the information. Here the main data is disappeared by 10,111,112,113,114
15 15
sustaining the characters in a fixed form. By retyping the ,115,116,117,118,1
19,120)
text or using OCR program by hidden information are
… … …….
been destroyed. … … ……
… … ……
D. Finding out Missing Letter N N …………..
Figures Through the authors observation, this paper tell us
about missing letter puzzle which means in each words In the above table said that the group table contains
one or more letter is missing. In a word a question mark is group number 1 carry only one unit like 1, group number
used on certain position or misplaced position. To make 2 carry two unit like 2 and 3 and nth group contain nth
the words meaningful each question mark is replaced by unit[17]. So if the number is given by 4 in 7th group is to
an appropriate letter in each word [9]. The words can be be represent then it is done like ( 6 , 4 ). Thus the pair
various domains or different span in a missing puzzle i.e. order ( α, β ) is defined as :
it can be a proper noun or terminologies of various field or α = Number of group have fully completed.
a combination of both. In a word of certain length the un
disclosed message of each character is out of sight where a β = left the number of extra element.
few or one letter is missing in it [10,13]. So, on the value
So, rrecipient only knows about the secret message, way Decoding Algorithm–Receiver side:
to hide the message and how to extract the information.
Sender also knows about the encoding technique and how
is applied to hide the secret message inside the text. This
scenario also repeat at receivers end and recipient also
knows about the decoding technique and also grasp the
knowledge about how to extract the secret message within
the text. The recreation of the method can be described in
fashion is distinctive in nature. The cover message is made
here so simple that may not be understood by the intruder.
And our secret message is “SECRET”. Which is encrypted
at the Sender end and simultaneously decrypted at the
Receiver end, the whole process is described below in
fig 1.
IV. CONCLUSION
In this paper, demonstration of mathematical formula with
number system and using DES algorithm where
Steganography is a method and text message is used as a
cover medium. This structure is fascinating the advantage
of the continuation of numerous unusual types of
Steganographic approach in a variety of languages. The
basic encouragement at the raise of this technique is
exploited for hiding the secret information is in a number
system devoid of using any conventional algorithm.
[4] J.C. Judge, "Steganography: Past, Present, Future", SANS white [13] S.H. Low, N.F. Maxemchuk, J.T. Brassil, L.O' Gorman, "Document
paper, November 30, 2001, http://www.sans.org/rr/papers/ marking and identification using both line and word shifting",
index.php? id = 552. Proceedings of the Fourteenth Annual Joint Conference of the IEEE
[5] M. Shirali Shahreza, “An Improved Method for Steganography on Computer and Communications Societies (INFOCOM'95), 2–6 April
Mobile Phone”, WSEAS Transactions on Systems, vol. 4, Issue 7, 1995,vol. 2, pp. 853–860.
July 2005, pp. 955–957. [14] K.K. Mandal, A. Jana, V. Agarwal, “A new approach of text
[6] G. Doërr, J.L. Dugelay, "A Guide Tour of Video Watermarking", Steganography based on mathematical model of number system”
Signal Processing: Image Communication, vol. 18, Issue 4, 2003, Circuit, Power and Computing Technologies (ICCPCT), IEEE, 20–
pp. 263–282. 21 March 2014, pp. 1737–1741.
[7] G. Doërr, J.L. Dugelay, "Security Pitfalls of Frame by Frame [15] S. Koley, K.K. Mandal, “A novel approach of secret message
Approaches to Video Watermarking", IEEE Transactions on Signal passing through text steganography” International Conference on
Processing, Supplement on Secure Media, vol. 52, Issue 10, 2004, “Signal Processing, Communication, Power and Embedded System
pp. 2955–2964. (SCOPES–2016)”, Issue–III, 978–1–5090–4620–1/16/$31.00
[8] K. Gopalan, "Audio Steganography using bit modification", ©2016 IEEE, ISBN CPF16H12-PRT/978–1–5090–4619–5, 3–5
Proceedings of the IEEE International Conference on Acoustics, Oct 2016, pp. 21–26.
Speech, and Signal Processing, (ICASSP '03), vol. 2, 6–10 April [16] Mandal K.K., Koley S., Mondal S. (2018) Number System
2003, pp. 421–424. Oriented Text Steganography in English Language for Short
[9] Baharudin Osman, Azman Yasin, Mohd Nizam Omar, “An Messages: A Decimal Approach. In: Bhalla S., Bhateja V.,
Analysis of Alphabet-based Techniques in Text Steganography”, Chandavale A., Hiwale A., Satapathy S. (eds) Intelligent
Journal of Telecommunication, Electronic and Computer Computing and Information and Communication. Advances in
Engineering , Vol. 8 No. 10, 2015, PP. 109–115. Intelligent Systems and Computing, vol. 673. Springer, Singapore.
[10] N. Provos, P. Honeyman “Hide and Seek” An introduction to [17] Koley S., Mandal K.K. (2017) Number System Oriented Text
Steganography, IEEE Security and Privacy, May/June 2003, Steganography in Various Language for Short Messages. In:
pp. 32–44. Mandal J., Dutta P., Mukhopadhyay S. (eds) Computational
[11] K. Bennett, "Linguistic Steganography: Survey, Analysis, and Intelligence, Communications, and Business Analytics. CICBA
Robustness Concerns for Hiding Information in Text", Purdue 2017. Communications in Computer and Information Science, vol.
University, CERIAS Tech. Report 2004–13. 775. Springer, Singapore.
[12] T. Moerland, "Steganography and Steganalysis", May15, 2003, [18] Mulunda, Christine K.; Wagacha, Peter W.; and Adede, Alfayo O.
www.liacs.nl /home/ tmoerlan/privtech.pdf. (2013) "Genetic Algorithm Based Model in Text Steganography," The
African Journal of Information Systems: Vol. 5: Iss. 4, Article 2.