Browse > Article
http://dx.doi.org/10.9723/jksiis.2014.19.5.051

A Study and improved Approach of Text Steganography  

Ji, Seon-Su (강릉원주대학교 정보기술공학과)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.19, no.5, 2014 , pp. 51-56 More about this Journal
Abstract
In the digital world of the internet, steganography is introduced to hide the existence of the secret communication by concealing a secret message inside another unsuspicious cover medium. The third parties are unaware that a stego medium is being communicated. There exists a large variety of steganography methods based on texts. In this paper, analyzed the advantages and significant disadvantages of each existing text steganography method and how new approach could be proposed as a solution. The objective of this paper is to propose a method for hiding the secret messages in safer manner from external attacks by encryption rearrangement key.
Keywords
Capacity; Steganography; Text hiding; Text steganography;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Seonsu Ji, "Locating and Searching Hidden Messages in Stego-Images", KIISC, Vol. 14, No. 3, pp. 37-43, 2009.   과학기술학회마을
2 L. Y. POR and B. Delina, "Information Hiding: A New Approach in Text Steganography", Applied Computer&Applied Computational Science(ACACOS 2008) Hangzhou, China, pp. 689-695, 2008.
3 Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal, "Study and Analysis of Text Steganography Tools", I. J. Computer Network and Information Security, Vol. 12, pp. 45-52, 2013.
4 Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal, "A Procedure of Text Steganography Using Indian Regional Language", I. J. Computer Network and Information Security, pp. 65-73, 2012.
5 Krista Bennett, "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text", CERIAS Tech Report 2004-13.
6 Swati Gupta and Deepti Gupta, "Text-Steganography: Review Study & Comparative Analysis", International Journal of Computer Science and Information Technologies, Vol. 2 (5), pp. 2060-2062, 2011.
7 S. R. Govada, B. S. Kumar, M. Devarakonda and M. J. Stephen, "Text Steganography with Multi level Shielding", IJCSI International Journal of Computer Science, Vol. 9, Issue 4, No 3, pp. 401-405, 2012.
8 Neha Rani and Jyoti Chaudhary, "Text Steganography Techniques: A Review", International Journal of Engineering Trends and Technology, Vo. 4 Issue 7, pp. 3013-3015, 2013.
9 Prem Singh, Rajat Chaudhary and Ambika Agarwal, "A Novel Approach of Text Steganography based on null spaces", IOSR Journal of Computer Engineering, Vol. 3, Issue 4, pp. 11-17, 2012.   DOI
10 Anandaprova Majumder and Suvamoy Changder, "A Novel Approach for Text Steganography: Generating Text Summary using Reflection Symmetry", International Conference on Computational Intelligence: Modeling Techniques and Applications, Procedia Technology 10, pp. 112-120, 2013.
11 Ammar Odeh and Khaled Elleithy, "Steganography in Arabic Text using Zero with and Ashidha Letters", International Journal of Computer Science & Information Technology, Vol 4, No 3, 2012.