Text Steganography using Daily Emotions Monitoring

Full Text (PDF, 620KB), PP.1-14

Views: 0 Downloads: 0

Author(s)

Sivabalan A. L Patiburn 1 Vahab Iranmanesh 1,* Phoey Lee Teh 1

1. Department of Computing and Information Systems Faculty of Science and Technology Sunway University Bandar Sunway, Malaysia

* Corresponding author.

DOI: https://doi.org/10.5815/ijeme.2017.03.01

Received: 19 Jan. 2017 / Revised: 2 Mar. 2017 / Accepted: 6 Apr. 2017 / Published: 8 May 2017

Index Terms

Text Steganography, Mobile Application, Emoticons

Abstract

Early in 2008, it was emphasized that sending messages through public networks will draw the attention of third parties such as attackers, perhaps causing attempts to break and reveal messages. Thus, cryptography was initially used to send a text message by producing cipher text. Although cryptography provides confidentiality for sent message, but the cipher text that is generated appears nonsense for the attacker, which leads to being identified as the sensitive information. In order to overcome this problem, this paper introduces a novel mobile steganography technique, based on using emoticons to deliver sensitive information as a daily emotion monitoring application. Based on achieved result, 88 characters can be embedded and sent to the recipient successfully in a hidden way.

Cite This Paper

Sivabalan A. L Patiburn, Vahab Iranmanesh, Phoey Lee Teh,"Text Steganography using Daily Emotions Monitoring", International Journal of Education and Management Engineering(IJEME), Vol.7, No.3, pp.1-14, 2017. DOI: 10.5815/ijeme.2017.03.01

Reference

[1]I. Banerjee, S. Bhattacharyya and G. Sanyal, "Study and Analysis of Text Steganography Tools", International Journal of Computer Network and Information Security, vol. 5, no. 12, pp. 45-52, 2013.

[2]M. Agarwal, "Text Steganographic Approaches: A Comparison", International Journal of Network Security & Its Applications, vol. 5, no. 1, pp. 91-106, 2013.

[3]N. Rani and J. Chaudhary, "Text Steganography Techniques: A Review", International Journal of Engineering Trends and Technology (IJETT), vol. 4, no. 5, pp. 3013-3015, 2013.

[4]A. Majumder and S. Changder, "A Novel Approach for Text Steganography: Generating Text Summary Using Reflection Symmetry", Procedia Technology, vol. 10, pp. 112-120, 2013.

[5]A. AminAli and A. Seddik Saad, "New Text Steganography Technique by using Mixed-Case Font", International Journal of Computer Applications, vol. 62, no. 3, pp. 6-9, 2013.

[6]S. Gupta and R. Jain, "An Innovative Method of Text Steganography", in Proceedings of the 2015 Third International Conference on Image Information Processing (ICIIP), Solan, India, 2015, pp. 60-64.

[7]M. Shirali-Shahreza and M. Shirali-Shahreza, "Text Steganography in SMS", International Conference on Convergence Information Technology (ICCIT), Gyeongju, Republic of Korea, 2007, pp. 2260-2265.

[8]T. P. Nagarhalli, "A New Approach to SMS Text Steganography using Emoticons", National Conference on Role of Engineers in Nation Building (NCRENB), 2014, pp. 1-3.

[9]S. Dulera, D. Jinwala and A. Dasgupta, "Experimenting with the Novel Approaches in Text Steganography", International Journal of Network Security & Its Applications, vol. 3, no. 6, pp. 213-225, 2011.

[10]S. Kingslin and N. Kavitha, "Evaluative Approach towards Text Steganographic Techniques", Indian Journal of Science and Technology, vol. 8, no. 29, 2015.

[11]M. Agarwal, "Text Steganographic Approaches: A Comparison", International Journal of Network Security & Its Applications, vol. 5, no. 1, pp. 91-106, 2013.

[12]A. Abdul-Aziz Gutub and M. Fattani, "A Novel Arabic Text Steganography Method Using Letter Points and Extensions", International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 1, no. 3, pp. 502-505, 2007.

[13]T. Dua, "Emojis by the numbers: A Digiday data dump - Digiday", Digiday, 2015. [Online]. Available: http://digiday.com/brands/digiday-guide-things-emoji. [Accessed: 16- Oct- 2016].

[14]L. Min Yang, V. Iranmanesh and J. C. Quiroz, "A New Approach to SMS Steganography using Mathematical Equations", International Conference on Computer Applications & Technology (ICCAT), Rome, Italy, 2015.

[15]L. POR and B. Delina, "Information Hiding: A New Approach in Text Steganography", 7th International Conference on Applied Computer and Applied Computational Science (ACACOS), Hangzhou, China, 2008, pp. 689-695.

[16]H. Singh, P. Singh and K. Saroha, "A Survey on Text Based Steganography", Proceedings of the 3rd National Conference, New Delhi, 2009, pp. 26-27.

[17]V. Saraswathi and S. Kingslin, "Different Approaches to Text Steganography: A Comparison", International Journal of Emerging Research in Management &Technology (ERMT), vol. 3, no. 11, pp. 124-127, 2014.

[18]S. Samanta, S. Dutta and G. Sanyal, "A Novel Approach of Text Steganography using Nonlinear Character Positions (NCP)", International Journal of Computer Network and Information Security, vol. 6, no. 1, pp. 55-60, 2013.

[19]V. Iranmanesh, H. Jing Wei, S. Lee Dao-Ming and O. Ayodeji Arigbabu, "On using Emoticons and Lingoes for Hiding Data in SMS", Technology Management and Emerging Technologies (ISTMET), Kuching, Malaysia, 2015, pp. 103-107.

[20]M. Shirali-Shahreza and M. Shirali-Shahreza., "Steganography in SMS by Sudoku Puzzle", International Conference on Computer Systems and Applications (ACS), Doha, Qatar, 2008, pp. 844-84.