Text Steganography Based on Parallel Encryption Using Cover Text (PECT)

被引:3
|
作者
Panwar, Subhash [1 ]
Kumar, Mukesh [2 ]
Sharma, Sakshi [2 ]
机构
[1] Govt Engn Coll, Dept IT, Bikaner 334004, India
[2] Govt Engn Coll, Dept CSE, Bikaner 334004, India
关键词
Internet of Things; Complexity; Hiding; Text Steganography; Plain text; Cover text; Encryption; Parallelism; Self-checking;
D O I
10.1007/978-3-030-39875-0_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a self-checking text steganography which could be used efficiently where large data is involved in various IoT applications. The space complexity of its cover text is one-fourth of its message size which is very less as compared to other techniques. The cover text of this method is generated from the private message itself. Later it is used to check the correctness of the data on receiver side. This helps to reduce the time overhead in case of corruption of any part of the data. Thus, the security and trust issues of IoT are easily handled even on high traffic channels.
引用
收藏
页码:303 / 313
页数:11
相关论文
共 50 条
  • [1] ECR(Encryption with Cover Text and Reordering) based Text Steganography
    Kataria, Sahil
    Singh, Kavita
    Kumar, Tarun
    Nehra, Maninder Singh
    2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 612 - 616
  • [2] CNN based "Text in Image" Steganography using Slice Encryption Algorithm and LWT
    Srinivasu, Lingamallu Naga
    Veeramani, Vijayaraghavan
    OPTIK, 2022, 265
  • [3] Encryption and steganography-based text extraction in IoT using the EWCTS optimizer
    Pandey, Binay Kumar
    Pandey, Digvijay
    Nassa, Vinay Kumar
    Ahmad, Tanveer
    Singh, Chaitanya
    George, A. Shaji
    Wakchaure, M. A.
    IMAGING SCIENCE JOURNAL, 2021, 69 (1-4): : 38 - 56
  • [4] A Method for Text Steganography Using Malayalam Text
    Vidhya, P. M.
    Paul, Varghese
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 524 - 531
  • [5] Encryption based LSB Steganography Technique for Digital Images and Text Data
    Kaur, Manpreet
    Sharma, Vinod Kumar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (09): : 90 - 97
  • [6] Handwriting Based Text Steganography Using Universal Languages
    Banerjee, Indradip
    Bandyopadhyay, Kaustav
    Mohan, Anand
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [7] Word based text compression using encryption
    Gupta, Ashutosh
    Agarwal, Suneeta
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 471 - +
  • [8] Unicode-based method for text steganography with Malayalam text
    Vidhya, P. M.
    Paul, Varghese
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 28 (04) : 1591 - 1600
  • [9] A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE
    Saeed, Melad J.
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2013, 8 (05) : 508 - 520
  • [10] Lossless Steganography: An Approach for Hiding Text under Image Cover
    Nandi, Biswarup
    Ghanti, Mousumi
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 436 - 441