A Text based Steganography Technique with Indian Root

被引:3
|
作者
Roy, Souvik [1 ]
Venkateswaran, P. [1 ]
机构
[1] Jadavpur Univ, Kolkata 700032, W Bengal, India
来源
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013 | 2013年 / 10卷
关键词
Steganography; Text Steganography; Information Security; Vedic Numeric Code;
D O I
10.1016/j.protcy.2013.12.349
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Steganography is the art and science of covered writing. Modern digital steganography uses text, images, audio, video etc. as a cover medium. This paper presents a text based steganography technique based on the Vedic Numeric Code. Frequency of the letters in English alphabet in conjunction with Vedic Numeric Code are used for the steganography technique. No separate importance is given for vowels and consonants. (C) 2013 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:167 / 171
页数:5
相关论文
共 50 条
  • [21] An Approach to Text Steganography Based on Search in Internet
    Shi, Shangwei
    Qi, Yining
    Huang, Yongfeng
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 227 - 232
  • [22] Text Steganography Based on Parallel Encryption Using Cover Text (PECT)
    Panwar, Subhash
    Kumar, Mukesh
    Sharma, Sakshi
    4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 303 - 313
  • [23] An Adaptive Frequency Based Steganography Technique
    Chhikara, Sonam
    Kumar, Rajeev
    INFORMATION, COMMUNICATION AND COMPUTING TECHNOLOGY, ICICCT 2018, 2019, 835 : 139 - 149
  • [24] AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media
    Ahvanooey, Milad Taleby
    Li, Qianmu
    Hou, Jun
    Mazraeh, Hassan Dana
    Zhang, Jing
    IEEE ACCESS, 2018, 6 : 65981 - 65995
  • [25] Palette Based Technique for Image Steganography
    Lamgunde, Anuradha
    Kale, Achana
    ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL, 2011, 125 : 364 - +
  • [26] Steganography in Ms Excel document using text-rotation technique
    Yang B.
    Sun X.
    Xiang L.
    Ruan Z.
    Wu R.
    Information Technology Journal, 2011, 10 (04) : 889 - 893
  • [27] Safe Transmission of text files through a new Audio Steganography Technique
    Punetha, Mayank
    Jain, Neelam
    Kumar, Ravi
    Gawande, Mohit
    Bhattacharya, Mahua
    PROCEEDINGS OF 2014 2ND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI), 2014, : 58 - 62
  • [28] A forward email based high capacity text steganography technique using a randomized and indexed word dictionary
    Maji, Giridhar
    Mandal, Sharmistha
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (35-36) : 26549 - 26569
  • [29] New Text Steganography Technique based on Multilayer Encoding with Format-Preserving Encryption and Huffman Coding
    Majeed, Mohammed Abdul
    Sulaiman, Rossilawati
    Shukur, Zarina
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (12) : 163 - 172
  • [30] Text steganography in webometrics
    Yaghobi S.R.
    Sajedi H.
    International Journal of Information Technology, 2021, 13 (2) : 621 - 635