A Procedure of Text Steganography Using Indian Regional Language

Full Text (PDF, 804KB), PP.65-73

Views: 0 Downloads: 0

Author(s)

Indradip Banerjee 1,* Souvik Bhattacharyya 1 Gautam Sanyal 2

1. Department Computer Science & Engineering,University Institute of Technology, Burdwan University, Burdwan, India

2. Department of Computer Science and Engineering, National Institute of Technology, Durgapur, West Bengal, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2012.08.08

Received: 11 Jan. 2012 / Revised: 1 Apr. 2012 / Accepted: 10 May 2012 / Published: 8 Aug. 2012

Index Terms

Text Steganography, Quantum Steganography, Security, Cover Text, Stego Text

Abstract

In this paper we present a work of text steganography. Now a days, maintain the security of the secret information has been a great challenge. Sender can send messages habitually through a communication channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography is a promising region which is used for secured data transmission over any public media. Substantial amount of research work has been accepted by different researchers on steganography. In this paper, a text steganography procedure has been planned with the help of an Indian regional language i.e. Oriya language. Text steganography together with quantum approach based on the use of two specific characters and two special characters like invited comas (opening and closing) in Oriya language and mapping technique of quantum gate truth table have been used.

Cite This Paper

Indradip Banerjee, Souvik Bhattacharyya, Gautam Sanyal, "A Procedure of Text Steganography Using Indian Regional Language", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.8, pp.65-73, 2012. DOI:10.5815/ijcnis.2012.08.08

Reference

[1]D. Deutsch. Quantum theory, the church-turing principle and the universal quantum computer. Proc. Roy. Soc. Lond. A, 400 (1985), 97-117.
[2]Fabien A.P. Petitcolas, Ross J. Anderson, Markus G. Kuhn: Information Hiding—A Survey, Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp. 1062-1078, ISSN 0018-9219.
[3]K. Bennett. Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text. Purdue University, CERIAS Tech. Report, 2004.
[4]Kran Bailey Kevin Curran. An evaluation of image based steganography methods. 1999.
[5]G. Doerr and J.L. Dugelay. Security pitfalls of framebyframe approaches to video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media., 52:2955–2964, 2004.
[6]G. Doerr and J.L. Dugelay. A guide tour of video watermarking. Signal Processing: Image Communication., 18:263–282, 2003.
[7]S. Low N.F. Maxemchuk J.T. Brassil and L. O.Gorman. Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communications, 13:1495–1504, 1995.
[8]Krista Bennett (2004). " Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text". CERIAS TR 2004-13.
[9]D. Deutsch. Quantum computational networks. Proc. Roy. Soc. Lond. A, 425 (1989), 73-90.
[10]R. P. Feynman. Quantum mechanical computers. Found. Phys. 16(1986), 507.
[11]Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal. "Novel text steganography through special code generation." In Proceedings of International Conference on Systemics,Cybernetics and Informatics (ICSCI-2011), Hyderabad,India., Jan 5-8, 2011.
[12]Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal. "The text steganography using article mapping technique(AMT) and SSCE". Journal of Global Research in Computer Science, 2, April 2011.
[13]Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal. Design and implementation of a secure text based steganography model. In 9th annual Conference on Security and Management (SAM) under The 2010 World Congress in Computer Science,Computer Engineering and Applied Computing(WorldComp 2010), LasVegas,USA, July 12-15,2010.
[14]Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal. Implementation of a novel text based steganography model. In National Conference on Computing and Systems (NACCS), Dept. of Computer Science, The University of Burdwan, Burdwan,India., Jan 29, 2010.
[15]Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal. A novel approach of secure text based steganography model using word mapping method(WMM). International Journal of Computer and Information Engineering 4:2 2010 - World Academy of Science, Engineering and Technology (WASET), 4:96103, Spring 2010.
[16]Souvik Bhattacharyya, Indradip Banerjee, Arka Prokash Mazumdar and Gautam Sanyal. Text steganography using formatting character spacing. IJICS, 13, Decembar, 2010.
[17]Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal. A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier. Journal of Global Research in Computer Science, 2, April 2011.
[18]Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal. An Approach of Quantum Steganography through Special SSCE Code. International Journal of Computer and Information Engineering - World Academy of Science, Engineering and Technology (WASET), Issue 0080:2011, Article 175, Page: 939-946.
[19]Ashok Muthukrishnan. Classical and quantum logic gates: An introduction to quantum computing. Quantum Information Seminar(Friday, Sep.3, 1999), Rochester Center for Quantum Information (RCQI).
[20]Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography. IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright and Privacy Protection, 16:474–481, 1998.
[21]JHP Eloff T Mrkel and MS Olivier. An overview of image steganography. In Proceedings of the fifth annual Information Security South Africa Conference, South Africa, 2005.
[22]S.P.Mohanty. Digital watermarking: A tutorial review. International Journal of Digital Evidence, Fall 2003, 2003.
[23]N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE Computer, 16:26–34, 1998.
[24]Kran Bailey Kevin Curran. An evaluation of image based steganography methods. International Journal of Digital Evidence,Fall 2003, 2003.
[25]D. Kahn. The codebreakers - the comprehensive history of secret communication from ancient times to the internet. Scribner, 1996.
[26]Z. Duric N. F. Johnson and S. Jajodia. Information hiding: Steganography and digital watermarking attacks and countermeasures. Kluwer Academic, 2001.
[27]S. Dowdy and S. Wearden. Statistics for research. Wiley. ISBN-0471086029, page 230, 1983.
[28]J. Gea-Banacloche. Journal of Mathematical Physics, pages 43, 4531, 2002.
[29]S. Natori. Quantum computation and information. Topics in Applied Physics(Springer, Berlin/Heidelberg), 102:235–240, 2006.
[30]K. Martin. Lecture Notes in Computer Science, pages 4567, 32, 2008.
[31]M. Curty and D. J. Santos. 2nd Bielefeld Workshop on Quantum Information and Complexity, 2000.
[32]Nielsen, Michael A. & Chuang, Isaac L. (2000). Quantum Computation and Quantum Information. Cambridge University Press. ISBN 0-521-63235-8.