Text Steganography Based on Parallel Encryption Using Cover Text (PECT)

被引:3
|
作者
Panwar, Subhash [1 ]
Kumar, Mukesh [2 ]
Sharma, Sakshi [2 ]
机构
[1] Govt Engn Coll, Dept IT, Bikaner 334004, India
[2] Govt Engn Coll, Dept CSE, Bikaner 334004, India
关键词
Internet of Things; Complexity; Hiding; Text Steganography; Plain text; Cover text; Encryption; Parallelism; Self-checking;
D O I
10.1007/978-3-030-39875-0_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a self-checking text steganography which could be used efficiently where large data is involved in various IoT applications. The space complexity of its cover text is one-fourth of its message size which is very less as compared to other techniques. The cover text of this method is generated from the private message itself. Later it is used to check the correctness of the data on receiver side. This helps to reduce the time overhead in case of corruption of any part of the data. Thus, the security and trust issues of IoT are easily handled even on high traffic channels.
引用
收藏
页码:303 / 313
页数:11
相关论文
共 50 条
  • [31] A compression-based text steganography method
    Satir, Esra
    Isik, Hakan
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (10) : 2385 - 2394
  • [32] Synonym Based Malay Linguistic Text Steganography
    Muhammad, Hasanah Zulcefli
    Rahman, Sharifah Mumtazah Syed Ahmad Abdul
    Shakil, Asma
    2009 CONFERENCE ON INNOVATIVE TECHNOLOGIES IN INTELLIGENT SYSTEMS AND INDUSTRIAL APPLICATIONS, 2009, : 423 - 427
  • [33] Text Steganography Based on Feature Coding Method
    Chaudhary, Sunita
    Dave, Meenu
    Sanghi, Amit
    INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,
  • [34] Text Steganography in Chat Based on Emoticons and Interjections
    Liu, Yuling
    Yang, Ting
    Xin, Guojiang
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2015, 12 (09) : 2091 - 2094
  • [35] An Approach to Text Steganography Based on Search in Internet
    Shi, Shangwei
    Qi, Yining
    Huang, Yongfeng
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 227 - 232
  • [36] Correction to: Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach
    Nuzhat Naqvi
    Aliya Tabassum Abbasi
    Rasheed Hussain
    M. Aihab Khan
    Basheer Ahmad
    Wireless Personal Communications, 2019, 105 : 1169 - 1169
  • [37] LSB Based Audio Steganography Based On Text Compression
    Begum, M. Baritha
    Venkataramani, Y.
    INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND SYSTEM DESIGN 2011, 2012, 30 : 703 - 710
  • [38] New Text Steganography Technique based on Multilayer Encoding with Format-Preserving Encryption and Huffman Coding
    Majeed, Mohammed Abdul
    Sulaiman, Rossilawati
    Shukur, Zarina
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (12) : 163 - 172
  • [39] New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption
    Majeed, Mohammed Abdul
    Sulaiman, Rossilawati
    Shukur, Zarina
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (01): : 170 - 191
  • [40] A Symmetrical Encryption Technique for Text Encryption Using Randomized Matrix Based Key Generation
    Mante, Pratik Gajanan
    Oswal, Harsh Rajendra
    Swain, Debabrata
    Deshpande, Deepali
    ADVANCES IN DATA SCIENCE AND MANAGEMENT, 2020, 37 : 137 - 148