DOI QR코드

DOI QR Code

텍스트 스테가노그래프의 개선된 접근과 연구

A Study and improved Approach of Text Steganography

  • 지선수 (강릉원주대학교 정보기술공학과)
  • 투고 : 2014.07.09
  • 심사 : 2014.09.30
  • 발행 : 2014.10.30

초록

인터넷의 디지털 세상에서 스테가노그래피는 의심스럽지 않은 커버 매체 안에 비밀 메시지를 숨겨서 비밀 통신의 존재를 은닉하기 위해 도입되었다. 제 3자는 비밀 메시지가 전달되는 사실을 인식하지 못한다. 텍스트 기반 스테가노그래피 기법은 다양하게 적용할 수 있다. 이 논문에서는 존재하는 각각의 텍스트 스테가노그래픽 기법의 장점과 단점을 분석하고, 효율적인 접근 방법을 제시한다. 외부적 공격으로부터 비밀 메시지를 안전하게 숨기기 위해 재배열 순서키에 의한 방법을 제안한다.

In the digital world of the internet, steganography is introduced to hide the existence of the secret communication by concealing a secret message inside another unsuspicious cover medium. The third parties are unaware that a stego medium is being communicated. There exists a large variety of steganography methods based on texts. In this paper, analyzed the advantages and significant disadvantages of each existing text steganography method and how new approach could be proposed as a solution. The objective of this paper is to propose a method for hiding the secret messages in safer manner from external attacks by encryption rearrangement key.

키워드

참고문헌

  1. Seonsu Ji, "Locating and Searching Hidden Messages in Stego-Images", KIISC, Vol. 14, No. 3, pp. 37-43, 2009.
  2. L. Y. POR and B. Delina, "Information Hiding: A New Approach in Text Steganography", Applied Computer&Applied Computational Science(ACACOS 2008) Hangzhou, China, pp. 689-695, 2008.
  3. Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal, "Study and Analysis of Text Steganography Tools", I. J. Computer Network and Information Security, Vol. 12, pp. 45-52, 2013.
  4. Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal, "A Procedure of Text Steganography Using Indian Regional Language", I. J. Computer Network and Information Security, pp. 65-73, 2012.
  5. Krista Bennett, "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text", CERIAS Tech Report 2004-13.
  6. Swati Gupta and Deepti Gupta, "Text-Steganography: Review Study & Comparative Analysis", International Journal of Computer Science and Information Technologies, Vol. 2 (5), pp. 2060-2062, 2011.
  7. S. R. Govada, B. S. Kumar, M. Devarakonda and M. J. Stephen, "Text Steganography with Multi level Shielding", IJCSI International Journal of Computer Science, Vol. 9, Issue 4, No 3, pp. 401-405, 2012.
  8. Neha Rani and Jyoti Chaudhary, "Text Steganography Techniques: A Review", International Journal of Engineering Trends and Technology, Vo. 4 Issue 7, pp. 3013-3015, 2013.
  9. Prem Singh, Rajat Chaudhary and Ambika Agarwal, "A Novel Approach of Text Steganography based on null spaces", IOSR Journal of Computer Engineering, Vol. 3, Issue 4, pp. 11-17, 2012. https://doi.org/10.9790/0661-0341117
  10. Anandaprova Majumder and Suvamoy Changder, "A Novel Approach for Text Steganography: Generating Text Summary using Reflection Symmetry", International Conference on Computational Intelligence: Modeling Techniques and Applications, Procedia Technology 10, pp. 112-120, 2013.
  11. Ammar Odeh and Khaled Elleithy, "Steganography in Arabic Text using Zero with and Ashidha Letters", International Journal of Computer Science & Information Technology, Vol 4, No 3, 2012.