Text Steganography Based on Parallel Encryption Using Cover Text (PECT)

被引:3
|
作者
Panwar, Subhash [1 ]
Kumar, Mukesh [2 ]
Sharma, Sakshi [2 ]
机构
[1] Govt Engn Coll, Dept IT, Bikaner 334004, India
[2] Govt Engn Coll, Dept CSE, Bikaner 334004, India
来源
4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES | 2020年 / 1122卷
关键词
Internet of Things; Complexity; Hiding; Text Steganography; Plain text; Cover text; Encryption; Parallelism; Self-checking;
D O I
10.1007/978-3-030-39875-0_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a self-checking text steganography which could be used efficiently where large data is involved in various IoT applications. The space complexity of its cover text is one-fourth of its message size which is very less as compared to other techniques. The cover text of this method is generated from the private message itself. Later it is used to check the correctness of the data on receiver side. This helps to reduce the time overhead in case of corruption of any part of the data. Thus, the security and trust issues of IoT are easily handled even on high traffic channels.
引用
收藏
页码:303 / 313
页数:11
相关论文
共 50 条
  • [21] Text steganography in chat
    Shirali-Shahreza, M. Hassan
    Shirali-Shahreza, Mohammad
    2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2007, : 266 - +
  • [22] A Novel Approach for Text Steganography: Generating Text Summary using Reflection Symmetry
    Majumder, Anandaprova
    Changder, Suvamoy
    FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 112 - 120
  • [23] Study of Chinese Text Steganography using Typos
    Zhou, Linna
    Liao, Derui
    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 1351 - 1357
  • [24] An Unique Data Security using Text Steganography
    Torvi, Savitha D.
    ShivaKumar, K. B.
    Dash, Rupam
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3834 - 3838
  • [25] Steganography in Text by Using MS Word Symbols
    Odeh, Ammar
    Elleithy, Khaled
    Faezipour, Miad
    2014 ZONE 1 CONFERENCE OF THE AMERICAN SOCIETY FOR ENGINEERING EDUCATION (ASEE ZONE 1), 2014,
  • [26] Genetic Algorithm Based Model in Text Steganography
    Mulunda, Christine K.
    Wagacha, Peter W.
    Adede, Alfayo O.
    AFRICAN JOURNAL OF INFORMATION SYSTEMS, 2013, 5 (04):
  • [27] A Text based Steganography Technique with Indian Root
    Roy, Souvik
    Venkateswaran, P.
    FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 167 - 171
  • [28] A Text Steganography Method Based on Markov Chains
    Shniperov, A. N.
    Nikitina, K. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (08) : 802 - 808
  • [29] A Huffman compression based text steganography method
    Satir, Esra
    Isik, Hakan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) : 2085 - 2110
  • [30] A Huffman compression based text steganography method
    Esra Satir
    Hakan Isik
    Multimedia Tools and Applications, 2014, 70 : 2085 - 2110