0% found this document useful (0 votes)
61 views4 pages

Information Hiding in Text Steganography A Different Approach-2019

Uploaded by

rawansalwan n
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views4 pages

Information Hiding in Text Steganography A Different Approach-2019

Uploaded by

rawansalwan n
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

2nd INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND SOFTWARE ENGINEERING (ICACSE-2019)

Information Hiding in Text Steganography:


A Different Approach
Kunal Kumar Mandal1 and Pradeep Kumar Singh2

Abstract—Today's internet world is flooded with huge amount of data which is resulting data leakage and theft of information. Lots
of challenges arise when transferring or receiving various kind of covered data, messages or information especially using the public
networks. Cyber crime one of the biggest imperfection in this fully connected internetworking world. Cyber attacks, phishing attacks,
intruder like third party are always active to hack official, personal or governmental information in the form of a message using this
networks. This is why we introduce the technique namely Steganography, where the tricky message has been hiding the
data/information confidently. Steganography is one of the best techniques for putting out of scene for a message bounded by other
media (cover) as if nothing is there. Here a number system is a cover media and text message hide over this cover media. In this paper
a number of co-ordinates using by the innovative formula which used in an novel way to hide the actual message. The predestined
receiver is always concerned with this algorithm. It can be much realized by the scholars as well as researchers to progress towards a
pioneering area of research for secret message transfer.This work is not a evaluation or enhancement of the earlier works but it is a
altered approach to text Steganography to hide the message. A fantastic combine of number, word to hide information. For developing
the application this paper could be very useful for concealing secret data / information for Central Bureau of Investigation, Defence
Intelligence Agency, Intelligence Bureau (IB) for sake of saving mother land.
Keywords: Steganography, Number system Method, DES Algorithm, Information Hiding


I. INTRODUCTION many approaches like in secret communication, tagging


features and copyright protection is also included. To
All over the1 world electronic media is a massive process identified a image as an intellectuals property watermark
of transferring ideas. In present days communication or copyright can be implant inside. with the help of this
media like SMS extend around 400 hundred billion per watermark any unauthorized use attempt of image can be
month. In the form of text a combination of what’s app recognized [5]. As a advantage of text steganography, we
and face book messenger covers data transfer around 60 can send a whole message by transferring it through
billion. A kind of technique is developed for transmitting image, video or audio. The video file will take a large
this immense amount of data. We are preferring English amount of text due to the extra covering of the secret
language only for working here. In other hand if any message. Cryptography is known as a art of “hide from
another language is synchronized with lingo it can also be view” of the information. In other hand steganography
evolve as a language [1,3]. A very broadly known arranges a hidden message in such a manner that only the
approach namely steganography is used here for sender and the receiver are aware of the presence of the
protecting the messages from external attack and message. Only the receiver and sender will know the
intervention with an exceptional way. In this technique we originality of the messages, were as the reality of the
get a path to predict recipient, for recognizing the message is free to be seen to the world is the speciality of
maintenance of the message. This process is done to cover cryptography [6,7]. In steganography its discard all the
a file, video, image or message. In another word unwanted notice of the hidden message. Both the message
steganography is a path by which a message is been as well as the content are intentionally hidden, where as in
overshadow by an extra message, as a result no one can cryptography method all the time it try to cover the subject
have a idea of its presence [2,4]. The message can only be of the message.
perceived by the address which is predetermined. In today’s world sending information and data
According to thithemius, there two type of grand– through computer network is at its maximum, beside this
encryption like i) polygraphia and ii) steganographia. The the security threat is also growing day by day. A
application of steganography on digital images is seen in significant role of protecting data and information on
network as the data transfer system is increased on internet
1Mankar College, Dept. of Computer Science, [4,9]. So in a mandatory the secrecy, privacy and integrity
KNIT Sultanpur of data for protecting authorized access by invaders. We
2Dept. of Computer, Science & Engineering, know that ‘An need is the father of inventions’, on the
KNIT Sultanpur ground of data and information hiding this consequences
E-mail: [email protected], is a massive development. For safety measures we follow
[email protected] numerous technique resembling steganography and

Electronic copy available at: https://ssrn.com/abstract=3351041


594 2nd International Conference on Advanced Computing and Software Engineering (ICACSE-2019)

cryptography. Reversely without any doubt it can be said of the character which is to be hidden the length of the
that apart from others, steganography portray further words depends on, the words are generated energetically.
concentration [8,10]. As we steganography is a process of There is no cover file which is pre-arranged. The
fine art by putting sensitive data out of vision and science technique is designed in such a way that without the cover
of overshadowing information so that the presence of the medium the steganography file is formed.
data can ‘t be recognized [11].
III. PROPOSED ALGORITHM AND TECHNICAL
II. PREVIOUS EFFORT BACKGROUND
In this section with the help of their advantages and as In this paper our cover media is a number system where
well as disadvantages various attempts are taken here to hiding a secrete message inside the text. Every number
describe this information hiding system. system requires working on the digits to find ultimate
value. In the same way to get the ending value in this
A. GA Applying on Alphabet–Based Techniques system also operates on digits but in some way the
In this paper to fortify the stego text from third party the calculation is different [14]. The number like 120 of
author have concentrate on Genetic Algorithm. Most of decimal is written as (14, 15) in this system. And the
the time it is been noticed that a doubtful stego which is calculation is done by the formula ((α* (α + 1) / 2) + β) for
produced from the generated stego text can be measured an ordered pair (α, β). Where α = 14 and β = 15. So the
by Jaro–Winkler–Measurement [12,18]. Many analyst final value is ((14 * 15) / 2) + 15 = ((7 * 15) + 15) = 105 +
concentrate on video, audio and image steganography but 15 = 120. Here every factor like α and β are treated as
in compared to others GA imparts optimize solution. With decimal. Now this is a concept where counting is done is
comparing to a video steganography it takes less memory different way [15, 16].
for communication. Here the division is done in a different way in my
system. In this system we consider any quantity of a
B. Semantic Application commodity and the counting start as,
In semantic scheme, we can hide any information within Proposed Number System:-
the text with the help of the words synonyms of a
Number in
particular words. The first and the foremost priority of the Group
Group
Group Element
scheme is to protect the information and as well as to 1 1 (1)
improve it also [8]. It can be violated in case of retyping or 2 2 (2,3)
using OCR program. Any how the significant of the 3 3 (4,5,6)
documentation make change[13]. 4 4 (7,8,9,10)
5 5 (11,12,13,14,15)
C. Feature Coding 6 6 (16,17,18,19,20,21)
(22,23,24,25,26,27,
7 7
With the help of this method some character in between 28)
the text can be changed. As for example, by shortened or …….. ……. …….
…….. ……. …….
elongated the last part of some character like m,r,e or so
(92,93,94,95,96,97,
on hiding information in text can be done [8,11]. In this 14 14 98,99,100,101,102,
procedure a enlarge volume of data is kept overshadow in 103,104,105)
the text without putting the reader aware of the existence (106,107,108,109,1
of the information. Here the main data is disappeared by 10,111,112,113,114
15 15
sustaining the characters in a fixed form. By retyping the ,115,116,117,118,1
19,120)
text or using OCR program by hidden information are
… … …….
been destroyed. … … ……
… … ……
D. Finding out Missing Letter N N …………..
Figures Through the authors observation, this paper tell us
about missing letter puzzle which means in each words In the above table said that the group table contains
one or more letter is missing. In a word a question mark is group number 1 carry only one unit like 1, group number
used on certain position or misplaced position. To make 2 carry two unit like 2 and 3 and nth group contain nth
the words meaningful each question mark is replaced by unit[17]. So if the number is given by 4 in 7th group is to
an appropriate letter in each word [9]. The words can be be represent then it is done like ( 6 , 4 ). Thus the pair
various domains or different span in a missing puzzle i.e. order ( α, β ) is defined as :
it can be a proper noun or terminologies of various field or α = Number of group have fully completed.
a combination of both. In a word of certain length the un
disclosed message of each character is out of sight where a β = left the number of extra element.
few or one letter is missing in it [10,13]. So, on the value

Electronic copy available at: https://ssrn.com/abstract=3351041


Information Hiding in Text Steganography: A Different Approach 595

So, rrecipient only knows about the secret message, way Decoding Algorithm–Receiver side:
to hide the message and how to extract the information.
Sender also knows about the encoding technique and how
is applied to hide the secret message inside the text. This
scenario also repeat at receivers end and recipient also
knows about the decoding technique and also grasp the
knowledge about how to extract the secret message within
the text. The recreation of the method can be described in
fashion is distinctive in nature. The cover message is made
here so simple that may not be understood by the intruder.
And our secret message is “SECRET”. Which is encrypted
at the Sender end and simultaneously decrypted at the
Receiver end, the whole process is described below in
fig 1.

Encoding Algorithm–Sender side

Figure 1: Message sending and receiving technique

IV. CONCLUSION
In this paper, demonstration of mathematical formula with
number system and using DES algorithm where
Steganography is a method and text message is used as a
cover medium. This structure is fascinating the advantage
of the continuation of numerous unusual types of
Steganographic approach in a variety of languages. The
basic encouragement at the raise of this technique is
exploited for hiding the secret information is in a number
system devoid of using any conventional algorithm.

So, all the above coordinator, are legitimate V. FUTURE SCOPE


coordinator and enclose the secret message. After getting Future research is a big challenging of any researchers for
all above information will apply DES encryption find out cover medium and expand the various kind of
technique on it for making it more secure the cipher text medium founded on number system and revise it to sparse
message with ECB mode and 128 bit’s size of key. Then the secret message. In every where security is the major
sender send the secret text message to receiver end. challenge or concern in any data hiding procedure, hence
Receiver received the cipher text message, applying enhancing novel security features and modifies it from
DES decryption technique on it and will get all the time to time is a great challenge.
coordinators like (18,3), (27,14), (25,12), (17,2), (27,14),
(19,4). After getting the all co-ordinator subtract the β REFERENCES
value from add value like (18 – 3) = 15 and attached again [1] K. Thangadurai, G. Sudha Devi, "An analysis of LSB Based Image
β value with this number like (15,3) and so on. In the same steganography Techniques", ICCCI , Jan. 03–05, 2014.
way receiver get the all co-ordinator like (18,3), (27,14), [2] D. Artz, "Digital Steganography: Hiding Data within Data", IEEE
(25,12), (17,2), (27,14), (19,4). Internet Compufing, May–Jun 2001, pp. 75–80.
[3] Chen, T.S. Chen, M.W. Cheng, "A New Data Hiding Scheme in
Now applying the mathematical technique or formula Binary Image," in Proc. Fifth Int. Symp. on Multimedia Software
like (( α* ( α + 1) / 2) + β ) on the above coordinator and Engineering. Proceedings, 2003, pp. 88–93.
get the original message.

Electronic copy available at: https://ssrn.com/abstract=3351041


596 2nd International Conference on Advanced Computing and Software Engineering (ICACSE-2019)

[4] J.C. Judge, "Steganography: Past, Present, Future", SANS white [13] S.H. Low, N.F. Maxemchuk, J.T. Brassil, L.O' Gorman, "Document
paper, November 30, 2001, http://www.sans.org/rr/papers/ marking and identification using both line and word shifting",
index.php? id = 552. Proceedings of the Fourteenth Annual Joint Conference of the IEEE
[5] M. Shirali Shahreza, “An Improved Method for Steganography on Computer and Communications Societies (INFOCOM'95), 2–6 April
Mobile Phone”, WSEAS Transactions on Systems, vol. 4, Issue 7, 1995,vol. 2, pp. 853–860.
July 2005, pp. 955–957. [14] K.K. Mandal, A. Jana, V. Agarwal, “A new approach of text
[6] G. Doërr, J.L. Dugelay, "A Guide Tour of Video Watermarking", Steganography based on mathematical model of number system”
Signal Processing: Image Communication, vol. 18, Issue 4, 2003, Circuit, Power and Computing Technologies (ICCPCT), IEEE, 20–
pp. 263–282. 21 March 2014, pp. 1737–1741.
[7] G. Doërr, J.L. Dugelay, "Security Pitfalls of Frame by Frame [15] S. Koley, K.K. Mandal, “A novel approach of secret message
Approaches to Video Watermarking", IEEE Transactions on Signal passing through text steganography” International Conference on
Processing, Supplement on Secure Media, vol. 52, Issue 10, 2004, “Signal Processing, Communication, Power and Embedded System
pp. 2955–2964. (SCOPES–2016)”, Issue–III, 978–1–5090–4620–1/16/$31.00
[8] K. Gopalan, "Audio Steganography using bit modification", ©2016 IEEE, ISBN CPF16H12-PRT/978–1–5090–4619–5, 3–5
Proceedings of the IEEE International Conference on Acoustics, Oct 2016, pp. 21–26.
Speech, and Signal Processing, (ICASSP '03), vol. 2, 6–10 April [16] Mandal K.K., Koley S., Mondal S. (2018) Number System
2003, pp. 421–424. Oriented Text Steganography in English Language for Short
[9] Baharudin Osman, Azman Yasin, Mohd Nizam Omar, “An Messages: A Decimal Approach. In: Bhalla S., Bhateja V.,
Analysis of Alphabet-based Techniques in Text Steganography”, Chandavale A., Hiwale A., Satapathy S. (eds) Intelligent
Journal of Telecommunication, Electronic and Computer Computing and Information and Communication. Advances in
Engineering , Vol. 8 No. 10, 2015, PP. 109–115. Intelligent Systems and Computing, vol. 673. Springer, Singapore.
[10] N. Provos, P. Honeyman “Hide and Seek” An introduction to [17] Koley S., Mandal K.K. (2017) Number System Oriented Text
Steganography, IEEE Security and Privacy, May/June 2003, Steganography in Various Language for Short Messages. In:
pp. 32–44. Mandal J., Dutta P., Mukhopadhyay S. (eds) Computational
[11] K. Bennett, "Linguistic Steganography: Survey, Analysis, and Intelligence, Communications, and Business Analytics. CICBA
Robustness Concerns for Hiding Information in Text", Purdue 2017. Communications in Computer and Information Science, vol.
University, CERIAS Tech. Report 2004–13. 775. Springer, Singapore.
[12] T. Moerland, "Steganography and Steganalysis", May15, 2003, [18] Mulunda, Christine K.; Wagacha, Peter W.; and Adede, Alfayo O.
www.liacs.nl /home/ tmoerlan/privtech.pdf. (2013) "Genetic Algorithm Based Model in Text Steganography," The
African Journal of Information Systems: Vol. 5: Iss. 4, Article 2.

Electronic copy available at: https://ssrn.com/abstract=3351041

You might also like