DOI QR코드

DOI QR Code

A Study of Hangul Text Steganography based on Genetic Algorithm

유전 알고리즘 기반 한글 텍스트 스테가노그래피의 연구

  • 지선수 (강릉원주대학교 정보기술공학과)
  • Received : 2016.04.06
  • Accepted : 2016.06.28
  • Published : 2016.06.30

Abstract

In a hostile Internet environment, steganography has focused to hide a secret message inside the cover medium for increasing the security. That is the complement of the encryption. This paper presents a text steganography techniques using the Hangul text. To enhance the security level, secret messages have been encrypted first through the genetic algorithm operator crossover. And then embedded into an cover text to form the stego text without changing its noticeable properties and structures. To maintain the capacity in the cover media to 3.69%, the experiments show that the size of the stego text was increased up to 14%.

인터넷의 적대적인 환경에서 보안성을 향상시키기 위해 스테가노그래피는 커버 매체 내부에 비밀 메시지를 숨기는데 초점을 두고 있다. 즉 암호화의 보완이다. 이 논문에서 한글을 이용한 텍스트 스테가노그래피 기법을 제안한다. 보안 수준을 높이기 위해 비밀 메시지는 유전 알고리즘 연산자 교차를 통해 암호화한다. 커버 매체의 특성과 구조 변화가 없는 스테고 텍스트 형태를 만들기 위한 커버 텍스트로 메시지를 삽입한다. 커버 매체에 3.69% 삽입 용량을 유지하기 위해, 스테고 텍스트의 크기가 14%로 증가되는 것을 확인할 수 있다.

Keywords

References

  1. S. S. Ji, "Advanced LSB technique for hiding messages in audio steganography", KIISC, Vol 17, No. 5, pp. 37-42, 2014.
  2. C. K. Mulunda, P. W. Wagacha and L. O. Adede, "Genetic algorithm based model in text steganography", The African Journal of Information Systems, Vol 5, Issue 4, Article 2, pp. 131-144, 2013.
  3. S. Bhattacharyya, I. Banerjee and G. Sanyal, "A novel approach of secure text based steganography model using word mapping method(WMM)", International Journal of Computer and Information Engineering Vol 4, No. 2, pp. 97-103, 2010.
  4. I. Banerjee, S. Bhattacharyya and G. Sanyal, "A procedure of text steganography using Indian regional language", I. J. Computer Network and Information Security, Vol 8, pp. 65-73, 2012.
  5. M. Nosrati and R. Karimi, "A survey on usage of genetic algorithms in recent steganography researches", World Applied Programming, Vol 2, No. 3, pp. 206-210, March 2012.
  6. Y. Kaya, M. Uyar and R. Tekin, "A novel crossover operator for genetic algorithms: ring crossover", AWERProcedia Information Technology&Computer Science, Vol 1, pp. 1286-1292, 2012.
  7. I. B. S. Bhattacharyya and G. Sanyal, "Design and implementation of a secure text based steganography model", In Proceedings of 9th annual Conference on Security and Management under The 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing, LasVegas, USA, July 12-15, 2010.
  8. T. Yalcinoz, H. Altun and M. Uzam, "Economic dispatch solution using a genetic algorithm based on arithmetic crossover", Proto Power Tech Conference 2001, 2001.
  9. B. Osman, R. Din and M. R. Idrus, "Capacity performance of steganography method text based domain" ARPN Journal of Engineering and Applied Sciences, Vol 10, NO. 3, pp. 1345-1351, 2015.