Browse > Article
http://dx.doi.org/10.9723/jksiis.2016.21.3.007

A Study of Hangul Text Steganography based on Genetic Algorithm  

Ji, Seon-Su (강릉원주대학교 정보기술공학과)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.21, no.3, 2016 , pp. 7-12 More about this Journal
Abstract
In a hostile Internet environment, steganography has focused to hide a secret message inside the cover medium for increasing the security. That is the complement of the encryption. This paper presents a text steganography techniques using the Hangul text. To enhance the security level, secret messages have been encrypted first through the genetic algorithm operator crossover. And then embedded into an cover text to form the stego text without changing its noticeable properties and structures. To maintain the capacity in the cover media to 3.69%, the experiments show that the size of the stego text was increased up to 14%.
Keywords
Crossover; Genetic algorithm; Hidden Data; Stego Text; Text Steganography;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 I. Banerjee, S. Bhattacharyya and G. Sanyal, "A procedure of text steganography using Indian regional language", I. J. Computer Network and Information Security, Vol 8, pp. 65-73, 2012.
2 M. Nosrati and R. Karimi, "A survey on usage of genetic algorithms in recent steganography researches", World Applied Programming, Vol 2, No. 3, pp. 206-210, March 2012.
3 Y. Kaya, M. Uyar and R. Tekin, "A novel crossover operator for genetic algorithms: ring crossover", AWERProcedia Information Technology&Computer Science, Vol 1, pp. 1286-1292, 2012.
4 I. B. S. Bhattacharyya and G. Sanyal, "Design and implementation of a secure text based steganography model", In Proceedings of 9th annual Conference on Security and Management under The 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing, LasVegas, USA, July 12-15, 2010.
5 T. Yalcinoz, H. Altun and M. Uzam, "Economic dispatch solution using a genetic algorithm based on arithmetic crossover", Proto Power Tech Conference 2001, 2001.
6 B. Osman, R. Din and M. R. Idrus, "Capacity performance of steganography method text based domain" ARPN Journal of Engineering and Applied Sciences, Vol 10, NO. 3, pp. 1345-1351, 2015.
7 S. S. Ji, "Advanced LSB technique for hiding messages in audio steganography", KIISC, Vol 17, No. 5, pp. 37-42, 2014.
8 C. K. Mulunda, P. W. Wagacha and L. O. Adede, "Genetic algorithm based model in text steganography", The African Journal of Information Systems, Vol 5, Issue 4, Article 2, pp. 131-144, 2013.
9 S. Bhattacharyya, I. Banerjee and G. Sanyal, "A novel approach of secure text based steganography model using word mapping method(WMM)", International Journal of Computer and Information Engineering Vol 4, No. 2, pp. 97-103, 2010.