A Novel Text Steganographic Technique Using Specific Alphabets
DOI:
https://doi.org/10.31357/jcs.v2i1.2721Abstract
In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its capacity depends on the similarity of characters of the words in cover text. In addition, as further improvement for security, secret message encryption is performed using Blowfish algorithm before hiding into the innocuous cover text.
Downloads
Published
Issue
Section
License
With each "accepted" manuscript, the corresponding author must submit a copyright form which transfers the copyright of the published article to the University of Sri Jayewardenepura that warrants the article is the original work of the author and does not infringe the copyright of any other parties. Before publication, the Editorial Office must receive a signed soft/hard copy of the copyright form. There is no need to send the copyright form until a manuscript is accepted.
Click here to download the copyright transfer form (doc)
The copyright form can be emailed to jcs@sjp.ac.lk