In line with the expansion of the Internet, the issue of information security has gained special importance. Many methods have been provided in order to establish hidden communications. In the meanwhile, steganography is one of a relatively new method. A method is introduced in this paper for exchanging information by steganography on HTML pages. The main idea in this method is to hide coded data in the ID attribute of the HTML document tags. Since numerous HTML pages are on the web, this method can be widely used. The suggested method is implemented by using the Java language.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J.C. Judge, “Steganography: Past, Present, Future", SANS white paper, November 30, 2001,“ http://www.sans.org/rr/papers/index.php?id=552”.
R. Chandramouli, and N. Memon, “Analysis of LSB based image steganography techniques", Proceedings of the International Conference on Image Processing, vol. 3, 7-10 Oct. 2001, pp. 1019 - 1022.
G. Doërr, and J.L. Dugelay, “A Guide Tour of Video Watermarking,” In Signal Processing: Image Communication, vol. 18, no. 4, April 2003, pp. 263-282.
K. Gopalan, “Audio steganography using bit modification", Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP ’03), vol. 2, 6-10 April 2003, pp. 421-424.
A.M. Alattar, and O.M. Alattar, “Watermarking electronic text documents containing justified paragraphs and irregular line spacing", Proc. of SPIE, Volume 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, June 2004, pp. 685-695.
M. Shirali Shahreza, “An Improved Method for steganography on Mobile Phone”, WSEAS Transactions on Systems, Issue 7, Vol. 4, July 2005, pp. 955-957.
D. Goodman, Dynamic HTML: The Definitive Reference, Second Edition, O’Reilly & Associates, Inc., 2002.
Elizabeth Castro, HTML 4 for the World Wide Web, Fourth Edition: Visual QuickStart Guide, Peachpit Press, 4th Edition, 1999.
HIPS Systems, “ShadowText”, “ http://home.apu.edu/∼ jcox/projects/HtmlStego1”, last visited: 29 July 2005.
Adrien Pinet, “SecurEngine Professional 1.0”, “ http://securengine.isecurelabs.com”, last visited: 20 September 2005
CamouflageSoftware, “Camouflage”, “ http://camouflage.unfiction.com/”, last visited September 20, 2005
Fazle Arefin, “Stego Machine”, “ http://www.fazle.info/”, last visited September 20, 2005
NeoByte Solutions, “Invisible Secrets 4”, “ http://www.invisiblesecrets.com/index.html”, last visited: 20 September 2005
-, “wbStego4open”,“ http://wbstego.wbailer.com/”, last visited: 20 September 2005
S. Forrest, Introduction to Deogol, “ http://wandership.ca/projects/deogol/”, last visited: 20 September 2005.
Corinna John, “Steganography 13 - Hiding binary data in HTML documents”, “ http://www.codeproject.com/csharp/steganodotnet.asp”, last visited: 20 September 2005
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer
About this paper
Cite this paper
Shahreza, M.S. (2007). A New Method for Steganography in HTML Files. In: Elleithy, K., Sobh, T., Mahmood, A., Iskander, M., Karim, M. (eds) Advances in Computer, Information, and Systems Sciences, and Engineering. Springer, Dordrecht. https://doi.org/10.1007/1-4020-5261-8_39
Download citation
DOI: https://doi.org/10.1007/1-4020-5261-8_39
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-5260-6
Online ISBN: 978-1-4020-5261-3
eBook Packages: EngineeringEngineering (R0)