Text Steganography Based on Parallel Encryption Using Cover Text (PECT)

被引:3
|
作者
Panwar, Subhash [1 ]
Kumar, Mukesh [2 ]
Sharma, Sakshi [2 ]
机构
[1] Govt Engn Coll, Dept IT, Bikaner 334004, India
[2] Govt Engn Coll, Dept CSE, Bikaner 334004, India
关键词
Internet of Things; Complexity; Hiding; Text Steganography; Plain text; Cover text; Encryption; Parallelism; Self-checking;
D O I
10.1007/978-3-030-39875-0_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a self-checking text steganography which could be used efficiently where large data is involved in various IoT applications. The space complexity of its cover text is one-fourth of its message size which is very less as compared to other techniques. The cover text of this method is generated from the private message itself. Later it is used to check the correctness of the data on receiver side. This helps to reduce the time overhead in case of corruption of any part of the data. Thus, the security and trust issues of IoT are easily handled even on high traffic channels.
引用
收藏
页码:303 / 313
页数:11
相关论文
共 50 条
  • [41] Image Steganography Using Fractal Cover and Combined Chaos-DNA Based Encryption
    Durafe A.
    Patidar V.
    Annals of Data Science, 2024, 11 (03) : 855 - 885
  • [42] Securing Text Messages Using Graph Theory and Steganography
    Abdul-Ghani, Samaher Adnan
    Abdul-Wahhab, Renna D.
    Abood, Enas Wahab
    BAGHDAD SCIENCE JOURNAL, 2022, 19 (01) : 189 - 196
  • [43] Dual Stage Text Steganography Using Unicode Homoglyphs
    Hosmani, Sachin
    Bhat, H. G. Rama
    Chandrasekaran, K.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 265 - 276
  • [44] An Innovative Method of Text Steganography
    Gupta, Shashank
    Jain, Rachit
    2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 60 - 64
  • [45] Audio Steganography with Embedded Text
    Jian, Chua Teck
    Wen, Chuah Chai
    Rahman, Nurul Hidayah Binti Ab.
    Hamid, Isredza Rahmi Binti A.
    INTERNATIONAL RESEARCH AND INNOVATION SUMMIT (IRIS2017), 2017, 226
  • [46] A novel steganography method using transliteration of Bengali text
    Khairullah, Md
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2019, 31 (03) : 348 - 366
  • [47] Review Paper On Text And Audio Steganography Using GA
    Johri, Prashant
    Kumar, Arun
    Amba
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 190 - 192
  • [48] An Evolution of Hindi Text Steganography
    Alla, Kalavathi
    Prasad, R. Siva Rama
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1577 - 1578
  • [49] Associative Steganography of Text Messages
    I. S. Vershinin
    R. F. Gibadullin
    S. V. Pystogov
    V. A. Raikhlin
    Moscow University Computational Mathematics and Cybernetics, 2021, 45 (1) : 1 - 11
  • [50] A technique of improved steganography text based on chaos and BPCS
    Shi, Peipei
    Li, Zhaohui
    Zhang, Tao
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 2, 2010, : 232 - 236