WhiteSteg: A new scheme in information hiding using text steganography

被引:0
|
作者
Faculty of Computer Science and Information Technology, University of Malaya, 50603 Kuala Lumpur, Malaysia [1 ]
机构
来源
WSEAS Trans. Comput. | 2008年 / 6卷 / 735-745期
关键词
Personal computing - Information use - Cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Sending encrypted messages frequently will draw the attention of third parties, i.e. crackers and hackers, perhaps causing attempts to break and reveal the original messages. In this digital world, steganography is introduced to hide the existence of the communication by concealing a secret message inside another unsuspicious message. The hidden message maybe plaintext, or any data that can be represented as a stream of bits. Steganography is often being used together with cryptography and offers an acceptable amount of privacy and security over the communication channel. This paper presents an overview of text steganography' and a brief history of steganography along with various existing techniques of text steganography. Highlighted are some of the problems inherent in text steganography as well as issues with existing solutions. A new approach, named WhiteSteg is proposed in information hiding using inter-word spacing and inter-paragraph spacing as a hybrid method to reduce the visible detection of the embedded messages. WhiteSteg offers dynamic generated cover-text with six options of maximum capacity according to the length of the secret message. Besides, the advantage of exploiting whitespaces in information hiding is discussed. This paper also analyzes the significant drawbacks of each existing method and how WhiteSteg could be recommended as a solution.
引用
收藏
相关论文
共 50 条
  • [41] Hiding encrypted speech using steganography
    Al-Najjar, Atef J.
    Alvi, Aleem K.
    Idrees, Syed U.
    Al-Manea, Abdul-Rahman M.
    LECTURE NOTES IN SIGNAL SCIENCE, INTERNET AND EDUCATION (SSIP'07/MIV'07/DIWEB'07), 2007, : 275 - +
  • [42] Hiding digital information using a novel system scheme
    Yeh, WH
    Hwang, JJ
    COMPUTERS & SECURITY, 2001, 20 (06) : 533 - 538
  • [43] Data hiding using video steganography
    Ravichandran, C.
    Vajravelu, Ashok
    Panda, Sankarsan
    Degadwala, Sheshang Dipakkumar
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (01) : 112 - 123
  • [44] Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images
    Petros L. K. Mantos
    Ilias Maglogiannis
    Journal of Medical Systems, 2016, 40
  • [45] Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images
    Mantos, Petros L. K.
    Maglogiannis, Ilias
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (06)
  • [46] An Efficient Steganography Method for Hiding Patient Confidential Information
    Al-Dmour, Hayat
    Al-Ani, Ahmed
    Hung Nguyen
    2014 36TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2014, : 222 - 225
  • [47] Steganography in IoT: Information Hiding with Joystick and Touch Sensors
    Koptyra, Katarzyna
    Ogiela, Marek R. R.
    SENSORS, 2023, 23 (06)
  • [48] New Approach toward Data Hiding Using XOR for Image Steganography
    Joshi, Kamaldeep
    Yadav, Rajkumar
    2016 NINTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2016, : 79 - 84
  • [49] Audio Steganography for Information Hiding and Covert Communication - A Tutorial
    Gopalan, K.
    2018 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2018, : 242 - 243
  • [50] A New Symmetric Information Hiding Scheme Based on Cover Randomness
    Ren, Fang
    Yu, Ming-Yu
    Xiu, Hai-Yan
    Hou, Wei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2023, 39 (01) : 149 - 166