DOI QR코드

DOI QR Code

A Techniques to Conceal Information Using Eojeol in Hangul Text Steganography

한글 텍스트 스테가노그래피에서 어절을 이용한 정보은닉 기법

  • 지선수 (강릉원주대학교 소프트웨어학과)
  • Received : 2017.08.05
  • Accepted : 2017.10.14
  • Published : 2017.10.31

Abstract

In the Digital Age, All Data used in the Internet is Digitized and Transmitted and Received Over a Communications Network. Therefore, it is Important to Transmit Data with Confidentiality and Integrity, Since Digital Data may be Tampered with and Tampered by Illegal users. Steganography is an Efficient Method for Ensuring Confidentiality and Integrity Together with Encryption Techniques. I Propose a Hangul Steganography Method that Inserts a Secret Message based on a Changing Insertion Position and a Changing Eojeol Size in a Cover Medium. Considering the Insertion Capacity of 3.35% and the File Size Change of 0.4% in Hangul Text Steganography, Experimental Results Show that the Jaro_score Value needs to be Maintained at 0.946.

디지털 시대에 인터넷에서 사용되는 모든 데이터는 디지털화되어 통신 네트워크를 통해 송신 및 수신된다. 따라서 디지털 데이터가 불법적인 사용자에 의해 변조되고 조작될 수 있기 때문에 기밀성과 무결성을 갖춘 암호화된 데이터를 전송하는 것이 중요하다. 스테가노그래피는 암호화 기법과 혼합되어 기밀성과 무결성을 함께 보장하기 위한 효율적인 방법이다. 커버 매체에 삽입되는 위치와 변화하는 어절 형태를 기반으로 비밀 메시지를 삽입하는 한글 텍스트 스테가노그래피 방법을 제안한다. 한글 텍스트 스테가노그래피에서 3.35%의 삽입용량과 0.4%의 파일 크기 변화를 고려할 때 실험결과는 Jaro_score 값이 0.946으로 유지할 필요가 있다는 것을 보여준다.

Keywords

References

  1. Ji S. S., "A Study of Hangul Text Steganography based on Genetic Algorithm", KIISC, Vol. 21, No. 3, pp. 7-12, 2016.
  2. Kim J. G. and Jeon J. H., "Factors Affecting Internet User's Information Security Intention: Focused on Computer Virus", KIECA, Vol. 5, No. 2, pp. 47-70, 2011.
  3. Agarwal M., "Text Steganographic Approaches : A Comparison", International Journal of Network Security&Its Applications, Vol. 5, No. 1, pp. 91-106, 2013. https://doi.org/10.5121/ijnsa.2013.5107
  4. Saraswathi V. and Kingslin Sumathy, "Different Approaches to Text Steganography: A Comparison", International Journal of Emerging Research in Management & Technology, Vol. 3, Issue 11, pp. 124-127, 2014.
  5. Kumar K. A., "A Comparative Result Analysis of Text Based Steganographic Approaches", Journal of Computer Engineering, Vol. 17, Issue 3, pp. 70-74, 2015.
  6. Nagarhalli T. P., "A New Approach to Text Steganography Using Adjectives", International Journal of Innovative Research in Science, Engineering and Technology, Vol. 4, Issue 5, pp. 3147-3152, 2015.
  7. Kingslin Sumathy and Kavitha N., "Evaluative Approach towards Text Steganographic Techniques", Indian Journal of Science and Technology, Vol. 8, No. 29, pp. 1-8, 2015.
  8. Abaas S. T., Z. Khudhair N., Kareem S. K. and Khudhair Zainab Nighal, "Improve Capacity in Text in Text Steganography", European Academic Research, Vol. II, Issue 12, pp. 15049-15061, 2015.
  9. Yufei Sun, Liangli Ma and Shuang Wang, "A Comparative Evaluation of String Similarity Metrics for Ontology Alignment", Journal of Information & Computational Science, Vol. 12, No. 3, pp. 957-964, 2015. https://doi.org/10.12733/jics20105420
  10. Cohen W., Ravikumar P. and Fienberg S. E., "A Comparison of String Distance Metrics for Name-Matching Tasks", American Association for Artificial Intelligence, pp. 73-78, 2003.