WhiteSteg: A new scheme in information hiding using text steganography

被引:0
|
作者
Faculty of Computer Science and Information Technology, University of Malaya, 50603 Kuala Lumpur, Malaysia [1 ]
机构
来源
WSEAS Trans. Comput. | 2008年 / 6卷 / 735-745期
关键词
Personal computing - Information use - Cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Sending encrypted messages frequently will draw the attention of third parties, i.e. crackers and hackers, perhaps causing attempts to break and reveal the original messages. In this digital world, steganography is introduced to hide the existence of the communication by concealing a secret message inside another unsuspicious message. The hidden message maybe plaintext, or any data that can be represented as a stream of bits. Steganography is often being used together with cryptography and offers an acceptable amount of privacy and security over the communication channel. This paper presents an overview of text steganography' and a brief history of steganography along with various existing techniques of text steganography. Highlighted are some of the problems inherent in text steganography as well as issues with existing solutions. A new approach, named WhiteSteg is proposed in information hiding using inter-word spacing and inter-paragraph spacing as a hybrid method to reduce the visible detection of the embedded messages. WhiteSteg offers dynamic generated cover-text with six options of maximum capacity according to the length of the secret message. Besides, the advantage of exploiting whitespaces in information hiding is discussed. This paper also analyzes the significant drawbacks of each existing method and how WhiteSteg could be recommended as a solution.
引用
收藏
相关论文
共 50 条
  • [1] Information hiding: A new approach in text steganography
    Por, L. Y.
    Delina, B.
    WSEAS: ADVANCES ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE, 2008, : 689 - +
  • [2] Hindi text steganography - An approach to information hiding
    Changder, S.
    Debnath, N. C.
    Ghosh, D.
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2010, 10 (1-2 SUPPL. 1) : S85 - S96
  • [3] Information hiding using steganography
    Amin, MM
    Salleh, M
    Ibrahim, S
    Katmin, MR
    Shamsuddin, MZI
    4TH NATIONAL CONFERENCE ON TELECOMMUNICATION TECHNOLOGY, PROCEEDINGS, 2003, : 21 - 25
  • [4] A New Model for Creating Layer Planes Using Steganography for Text Hiding
    Mshir, Shalaw
    Varol, Asaf
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [5] Information Hiding using Bucket Steganography
    Koptyra, Katarzyna
    Ogiela, Marek R.
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2021), 2021, : 292 - 293
  • [6] A New Steganography Method for Hiding Text into RGB Image
    Ibrahim, AL-Hasan Amer
    Anooz, Ruaa Shallal Abbas
    Abdulkareem, Mohammed Ghassan
    Albadr, Musatafa Abbas Abbood
    AL-Dhief, Fahad Taha
    Hussein, Yaqdhan Mahmood
    Hanoosh, Hatem Oday
    Mutar, Mohammed Hasan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 867 - 876
  • [7] A new steganography algorithm for text hiding in the frequency domain
    Mustafa, Mohammed
    Al-Zoubi, Moh'd Belal
    Advances in Modelling and Analysis B, 2006, 49 (3-4): : 53 - 65
  • [8] Information hiding: Arabic text steganography by using Unicode characters to hide secret data
    Ditta, Allah
    Cai Yongquan
    Azeem, Muhammad
    Rana, Khurram Gulzar
    Yu, Haiyang
    Memon, Muhammad Qasim
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (01) : 61 - 78
  • [9] The Application Of LSB Steganography For Secure Text and Hiding Confidential Information Using AES Cryptography
    Ahyuna, Ahyuna
    Syamsuddin, Sadly
    Hasriani, Hasriani
    Ardimansyah, Ardimansyah
    Irmawati, Irmawati
    Wahyuni, Sri
    3RD INTERNATIONAL CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS (ICORIS 2021), 2021, : 356 - 362
  • [10] A survey on information hiding using video steganography
    Mukesh Dalal
    Mamta Juneja
    Artificial Intelligence Review, 2021, 54 : 5831 - 5895