Abstract
Steganography maintain the security of the secret data through a communication channel, which causing attempts to break and reveal the original messages. In this paper, a text steganography technique has been proposed with the help of Bengali language. Text steganography including quantum approach based on the use of two specific characters and two special characters like invited comas (opening and closing) in Bengali language and mapping technique of quantum gate truth table have been used.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Al-Mualla, M., Al-Ahmad, H.: Information Hiding: Steganography and Watermarking, http://www.emirates.org/ieee/information_hiding.pdf
Ross, J.A., Petitcolas, F.A.P.: On the Limits of Steganography. IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright and Privacy Protection 16(4), 474–481 (1998)
Bailey, K., Curran, K.: An Evaluation of Image Based Steganography Methods (1999)
Mrkel, T., Eloff, J.H.P., Olivier, M.S.: An Overview of Image Steganography. In: Proceedings of the Fifth Annual Information Security South Africa Conference, South Africa (2005)
Gea-Banacloche, J.: Journal of Mathematical Physics (2002)
Natori, S.: Quantum Computation and Information. In: Topics in Applied Physics, vol. 102, pp. 235–240. Springer, Heidelberg (2006)
Martin, K.: Lecture Notes in Computer Science (2008)
Curty, M., Santos, D.J.: 2nd Journal Bielefeld Workshop on Quantum Information and Complexity (2000)
Muthukrishnan, A.: Classical and Quantum Logic Gates: An Introduction to Quantum Computing. In: Quantum Information Seminar, Rochester Center for Quantum Information (RCQI) (1991)
Feynman, R.P.: Quantum Mechanical Computers. Found. Phys. 16, 507 (1986)
Deutsch, D.: Quantum Theory, the Church-Turing Principle and the Universal Quantum Computer. Proceedings of Roy. Soc. Lond. A 400, 97–117 (1985)
Deutsch, D.: Quantum computational networks. Proceedings of Roy. Soc. Lond. A 425, 73–90 (1989)
Bennett, K.: Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text, Purdue University, CERIAS Technical Report (2004)
Bhattacharyya, S., Banerjee, I., Sanyal, G.: Design and Implementation of a Secure Text Based Steganography Model. In: Proceedings of 9th Annual Conference on Security and Management (SAM) under The 2010 World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp 2010), LasVegas, USA (July 2010)
Bhattacharyya, S., Banerjee, I., Sanyal, G.: Implementation of a Novel Text Based Steganography Model. In: National Conference on Computing and Systems (NACCS), Dept. of Computer Science, The University of Burdwan, Burdwan (2010)
Bhattacharyya, S., Banerjee, I., Sanyal, G.: A Novel Approach of Secure Text Based Steganography Model using Word Mapping Method (WMM). Proceedings of International Journal of Computer and Information Engineering 4(2) (2010); World Academy of Science, Engineering and Technology (WASET), 4(2), 96–103 (2010)
Bhattacharyya, S., Mazumdar, A.P., Banerjee, I., Sanyal, G.: Text Steganography using Formatting Character Spacing. Proceedings of IJICS 13(2) (December 2010)
Bhattacharyya, S., Banerjee, I., Sanyal, G.: Data Hiding Through Multi Level Steganography and SSCE. Journal of Global Research in Computer Science 2(2) (2011)
Bhattacharyya, S., Banerjee, I., Sanyal, G.: The Text Steganography using Article Mapping Technique (AMT) and SSCE. Journal of Global Research in Computer Science 2(4) (April 2011)
Bhattacharyya, S., Banerjee, I., Sanyal, G.: A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier. Journal of Global Research in Computer Science 2(4) (April 2011)
Bhattacharyya, S., Banerjee, I., Sanyal, G.: Novel Text Steganography through Special Code Generation. In: Proceedings of International Conference on Systemics,Cybernetics and Informatics (ICSCI 2011), Hyderabad, India (2011)
Bhattacharyya, S., Banerjee, I., Sanyal, G.: An Approach of Quantum Steganography through Special SSCE Code. Proceedings of International Journal of Computer and Information Engineering - World Academy of Science, Engineering and Technology (WASET) 175, 939–946 (2011)
Correlation and Dependence, http://en.wikipedia.org/wiki/Correlation_and_dependence
Dowdy, S., Wearden, S.: Statistics for Research. Wiley (1983) ISBN 0471086029
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Banerjee, I., Bhattacharyya, S., Sanyal, G. (2012). Text Steganography through Quantum Approach. In: Venugopal, K.R., Patnaik, L.M. (eds) Wireless Networks and Computational Intelligence. ICIP 2012. Communications in Computer and Information Science, vol 292. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31686-9_74
Download citation
DOI: https://doi.org/10.1007/978-3-642-31686-9_74
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31685-2
Online ISBN: 978-3-642-31686-9
eBook Packages: Computer ScienceComputer Science (R0)