WhiteSteg: A new scheme in information hiding using text steganography

被引:0
|
作者
Faculty of Computer Science and Information Technology, University of Malaya, 50603 Kuala Lumpur, Malaysia [1 ]
机构
来源
WSEAS Trans. Comput. | 2008年 / 6卷 / 735-745期
关键词
Personal computing - Information use - Cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Sending encrypted messages frequently will draw the attention of third parties, i.e. crackers and hackers, perhaps causing attempts to break and reveal the original messages. In this digital world, steganography is introduced to hide the existence of the communication by concealing a secret message inside another unsuspicious message. The hidden message maybe plaintext, or any data that can be represented as a stream of bits. Steganography is often being used together with cryptography and offers an acceptable amount of privacy and security over the communication channel. This paper presents an overview of text steganography' and a brief history of steganography along with various existing techniques of text steganography. Highlighted are some of the problems inherent in text steganography as well as issues with existing solutions. A new approach, named WhiteSteg is proposed in information hiding using inter-word spacing and inter-paragraph spacing as a hybrid method to reduce the visible detection of the embedded messages. WhiteSteg offers dynamic generated cover-text with six options of maximum capacity according to the length of the secret message. Besides, the advantage of exploiting whitespaces in information hiding is discussed. This paper also analyzes the significant drawbacks of each existing method and how WhiteSteg could be recommended as a solution.
引用
收藏
相关论文
共 50 条
  • [21] Hiding Secret Information Using LSB Based Audio Steganography
    Binny, Anu
    Koilakuntla, Maddulety
    2014 INTERNATIONAL CONFERENCE ON SOFT COMPUTING & MACHINE INTELLIGENCE ISCMI 2014, 2014, : 56 - 59
  • [22] Hiding Information in Digital Images Using LSB Steganography Technique
    Jebur S.A.
    Nawar A.K.
    Kadhim L.E.
    Jahefer M.M.
    International Journal of Interactive Mobile Technologies, 2023, 17 (07) : 167 - 178
  • [23] Improved BEMD data hiding Scheme Data hiding Binary Exploitation Modification Direction Scheme Using Image Steganography
    Agarwal, Shuchi
    Bisht, Jaipal Singh
    2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 206 - 211
  • [24] Analysis of Existing Text Hiding Algorithms for Image Steganography Using TLNUS and AES
    Gurrala, Jagadish
    Naidu, P. Sanyasi
    SMART COMPUTING AND INFORMATICS, 2018, 77 : 1 - 11
  • [25] Czech Text Steganography Method by Selective Hiding Technique
    Khan, Sungkrityayan
    Sankineni, Rishi
    Balagurunathan, Padmavathi
    Shree, Nujerlla Suresh Divya
    Balasubramanian, Abinaya
    WORLD CONGRESS ON ENGINEERING, WCE 2015, VOL I, 2015, : 482 - 485
  • [26] Information hiding using secret sharing scheme
    Zou Xinguang
    Sun Shenghe
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 484 - +
  • [27] Information Hiding Into OBJ Format File Using Vector Steganography Techniques
    Mados, Branislav
    Balaz, Anton
    Adam, Norbert
    Hurtuk, Jan
    2018 IEEE 12TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2018, : 91 - 95
  • [28] HIT:: A new approach for hiding multimedia information in text
    El-Kwae, EA
    Cheng, L
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 132 - 140
  • [29] Data hiding technique in steganography for information security using number theory
    Rehman, Amjad
    Saba, Tanzila
    Mahmood, Toqeer
    Mehmood, Zahid
    Shah, Mohsin
    Anjum, Adeel
    JOURNAL OF INFORMATION SCIENCE, 2019, 45 (06) : 767 - 778
  • [30] Secret information hiding in image randomly method using steganography and cryptography
    Hammoud, Awad Kadhim
    Mohaisen, Hatem Nahi
    Mohammed, Mohammed Q.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1283 - 1291