Advertisement

Number System Oriented Text Steganography in Various Language for Short Messages

  • Santanu KoleyEmail author
  • Kunal Kumar Mandal
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 775)

Abstract

Data and information leakage is one of the prevalent tribulations in today’s internet world during transfer. Traditional algorithms are not enough to hide data/information theft. This is the reason behind developing number system oriented text Steganography for short messages. This is the permutation of art and science appears as non existence of required data put out of sight. A novel method can be used to hide all the characters starting from A to Z, a to z, numeric like 0 to 9 and special characters where any language can take a part. This is possible to hide a message transmitting in the form of SMS, WhatsApp, Email or facebook messenger. An excellent blend of number of pairs shape words, numbers to hide information. This paper could be very much useful for developing application for concealing secret data/information for army, navy of air force for sake of saving motherland.

Keywords

Text steganography Pair of number Information hiding Secret message 

References

  1. 1.
    Detailed about this statistic/trend. http://www.grabstats.com/statmain.aspx?StatID=402. Accessed Mar 2017
  2. 2.
    Messenger and WhatsApp process 60 billion messages a day, three times more than SMS. http://www.theverge.com/2016/4/12/11415198/facebook-messenger-whatsapp-number-messages-vs-sms-f8-2016. Accessed Mar 2017
  3. 3.
    Jagetiya, A., Rama Krishna, C.: Digital image steganography “seeing is always not believing” research front. CSI Commun. 38(3), 23–26 (2014)Google Scholar
  4. 4.
    Chandramouli, R., Memon, N.: Analysis of LSB based image Steganography techniques. In: Proceedings of the International Conference on Image Processing, 7–10 October, vol. 3, pp. 1019–1022 (2001)Google Scholar
  5. 5.
    Kumar, R., Malik, A., Singh, S., Kumar, B., Chand, S.:A space based reversible high capacity text steganography scheme using font type and style. In: ICCCA, 29–30 April 2016. IEEE (2016)Google Scholar
  6. 6.
    Sharma, S., Gupta, A., Trivedi, M.C., Yadav, V.K.: Analysis of different text steganography techniques: a survey. In: Computational Intelligence and Communication Technology (CICT), 12–13 February 2016. IEEE (2016)Google Scholar
  7. 7.
    Gupta, S., Jain, R.: An innovative method of text steganography. In: Image Information Processing (ICIIP), 21–24 December 2015. IEEE (2015)Google Scholar
  8. 8.
    Shi, S., Qi, Y., Huang, Y.: An approach to text steganography based on search in internet. In: International Computer Symposium (ICS), 15–17 December 2016Google Scholar
  9. 9.
    Chen, T.S.C., Cheng, M.W.: A new data hiding scheme in binary image. In: Proceedings of the Fifth International Symposium on Multimedia Software Engineering, pp. 88–93 (2003)Google Scholar
  10. 10.
    Judge, J.C.: Steganography: past, present, future, SANS white paper. http://www.sans.org/rr/papers/index.php?id=552. Accessed Mar 2017
  11. 11.
    Shirali Shahreza, M.: An improved method for steganography on mobile phone. WSEAS Trans. Syst. 4(7), 955–957 (2005)Google Scholar
  12. 12.
    Doërr, G., Dugelay, J.L.: A guide tour of video watermarking. Sig. Process. Image Commun. 18(4), 263–282 (2003)CrossRefGoogle Scholar
  13. 13.
    Doërr, G., Dugelay, J.L.: Security pitfalls of frame by frame approaches to video watermarking. IEEE Trans. Sig. Process. Suppl. Secur. Media 52(10), 2955–2964 (2004)CrossRefGoogle Scholar
  14. 14.
    Gopalan, K.: Audio steganography using bit modification. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2003, 6–10 April 2003, vol. 2, pp. 421–424 (2003)Google Scholar
  15. 15.
    Brassil, J.T., Low, S., Maxemchuk, N.F., O’Gorman, L.: Electronic marking and identification techniques to discourage document copying. IEEE J. Sel. Areas Commun. 13(8), 1495–1504 (1995)CrossRefGoogle Scholar
  16. 16.
    Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3&4), 313–336 (1996)CrossRefGoogle Scholar
  17. 17.
    Provos, N., Honeyman, P.: Hide and seek- an introduction to steganography. IEEE Secur. Priv. 1(3), 32–44 (2003)CrossRefGoogle Scholar
  18. 18.
    Bennett, K.: Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text, Purdue University, CERIAS Technical report (2004-13)Google Scholar
  19. 19.
    Moerland, T.: Steganography and Steganalysis. www.liacs.nl/home/tmoerlan/privtech.pdf. Accessed Mar 2017
  20. 20.
    Low, S.H., Maxemchuk, N.F., Brassil, J.T., O’Gorman, L.: Document marking and identification using both line and word shifting. In: Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 1995, vol. 2, pp. 853–860, 2–6 April 1995Google Scholar
  21. 21.
    Mandal, K.K., Jana, A., Agarwal, V.: A new approach of text Steganography based on mathematical model of number system. In: Circuit, Power and Computing Technologies (ICCPCT), pp. 1737–1741, 20–21 March 2014. IEEE (2014)Google Scholar
  22. 22.
    Koley, S., Mandal, K.K.: A novel approach of secret message passing through text steganography. In: International Conference on Signal Processing, Communication, Power and Embedded System, SCOPES – 2016, 3–5 October 2016, pp. 21–26 (2016). Issue – III, 978-1-5090-4620-1/16/$31.00 ©2016 IEEE, ISBN CPF16H12-PRT/978-1-5090-4619-5Google Scholar
  23. 23.
    Mandal, K.K.,Koley, S., Dhar, S.: A mathematical model for secret message passing using Steganography. In: Computational Intelligence and Computing Research (ICCIC), pp. 1–6, 15–17 December 2016. IEEEGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Budge Institute of TechnologyKolkataIndia
  2. 2.Mankar CollegeMankarIndia

Personalised recommendations