SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. III (May-Jun. 2016), PP 73-77
www.iosrjournals.org
DOI: 10.9790/0661-1803037377 www.iosrjournals.org 73 | Page
A Novel Approach For Data Hiding In Web Page Steganography
Using Encryption With Compression Based Technique
Ram Krishna Singh1
, Bhavya Alankar2
1
(Research Scholar, Computer Science, Jamia Hamdard, India)
2
(Assistant Professor, Computer Science, Jamia Hamdard, India)
Abstract: Cryptography, Steganography and Watermarking are three rudimentary techniques which will avail
us to secure data from unauthorized access. Steganography is one of the best techniques to obnubilate message
from unauthorized users. It is utilized to obnubilate data through sundry medium like audio, video, Text and
image. In our research work, we fixate on text Steganography through html web pages to obnubilate data
behind it. Because html pages are facilely transferable that contains secret data behind it. There are sundry
methods of web pages predicated Steganography. Some of the mundane methods are white spaces, order of
attributes, change case letter, change quotation marks, reiterate attributes to obnubilate data etc. But these all
methods have some inhibition like iota of data can be obnubilated behind html page & do not have most sizably
voluminous embedding capacity etc. To surmount or enhance these circumscriptions we optate to apply any
compression technique afore embedding process so that it can obnubilate substantial amount of data and
secondly security is much more consequential thus we have to apply any encryption techniques so that data
cannot transferable in its pristine form. Thus in our research work we fixates on embedding techniques,
compression and encryption techniques. So that system will be more power full as well as secure.
Keywords: Compression Ratio, Embedding Technique, Encryption, Huffman Algorithm, Steganography.
I. Introduction
With the rapid development of internet era, the information plays a consequential role. The information
is sent and received from one place to another. So the main aspect is to secure that information. Thus sundry
techniques including Steganography, cryptography etc. is utilized to secure information over the cyber world.
Steganography is a technique for securing information by obnubilating it in some other medium, cryptography is
the science of converting the messages that are intended to be secret into some other form, such that it is not
understandable to anyone other than the intended sender and recipients. Steganography is a Greek word which
betokens concealed inditing or obnubilated inditing. Steganography is an art and science of encoding
obnubilated messages in such a way that no one accepts the sender and recipient ken about the subsistence of the
data. In Steganography an unauthorized person cannot able to optically discern the message because message is
obnubilated in carrier and peregrinate through the carrier. The carrier of the message may be plain text, image,
audio, video etc. Text predicated Steganography techniques can be applied on webpage text and plaintext.
WWW pages have become the main way to provide the information for users. A webpage text contains HTML,
CSS, XML, and JavaScript as content.
The bearer record postulates an imperative part in outlining Steganography calculations. Picture, sound,
video, and content are distinctive media utilized as often as possible over the Internet [13]. Each of these
conveyor documents sorts has certain attributes that empower the client to embed the information inside. Picture
documents are the most broadly utilized records as bearer documents which contain high proportion of
information recurrence [14]. Then again, it is arduous to utilize the same picture to stow away distinctive
messages, since contrasting comparative pictures may sanction assailants with unearth the covered information.
Sound documents are verbalized with as sine or cosine waves. A few methods propose to move the stage to
conceal zeros and ones [15]. Content documents verbalize with the most onerous conveyor records, since
content documents contain minimal perpetual information contrasted with different bearers [16].
Content Steganography is grouped into sundry classes. A standout amongst the most prominent content
Steganography strategies is semantic Steganography [17]. This procedure makes utilization of equipollent words
in the same dialect or comparative dialects, for example, American English and British English. This is
culminated by making a lexicon of equipollent words and trading words to pass zero or one. Different
relegations conceal information relying upon the dialect sentence structure. This is kenned as the most punctual
procedures that utilize the physical configuration of content to obnubilate data. Different situations utilize
phonetic properties to shroud information and rely on upon the document era to pass on the data [18].
A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With..
DOI: 10.9790/0661-1803037377 www.iosrjournals.org 74 | Page
II. Types Of Steganography
There are many types of Steganography methods. Fig. 1.2 below shows four main categories that can
be utilized for Steganography techniques viz text, audio, video and image Steganography.
1) Text Steganography: It obnubilates the text abaft some other text file or HTML Page. It is an arduous form of
Steganography as the redundant amount of text to obnubilate the secret message is scarce in text files.
2) Image Steganography: It is one of the most commonly used techniques because of the constraint of the
Human visual System (HVS). Human ocular perceiver cannot detect the astronomical range of colors and a
nugatory vicissitude in the quality of an image that results from Steganography.
3) Audio Steganography: It is additionally an arduous form of Steganography as humans are able to detect a
minute transmutation in the quality of audio.
Fig 1: Types of Steganography
III. Motivation For Web Steganography
As the information is transmitted over the cyber world so security of information is most paramount.
The web page is most consequential carrier for travelling the information because web pages are facilely
transferring from one place to another place no one can visually perceive the information. Albeit there are many
techniques for transfer the information like image, audio, and video etc. But html predicated Steganography is
facile and secure technique
IV. Framework Of The Proposed Technique
The proposed technique essentially has the following schema. It depicts the fundamental flow of the
both the obnubilating and extracting process of the proposed technique. Here we used adaptive Huffman coding
for the compression. An adaptive Huffman algorithm withal called dynamic Huffman coding. A variation called
adaptive Huffman coding involves calculating the probabilities dynamically predicated on recent genuine
frequencies in the sequence of source symbols, and transmuting the coding tree structure to match the updated
probability estimates. It is utilized infrequently in practice, since the cost of updating the tree makes it more
gradual than optimized. Adaptive arithmetic coding that is more flexible and has a better compression.
Fig 2: proposed framework.
A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With..
DOI: 10.9790/0661-1803037377 www.iosrjournals.org 75 | Page
V. Experimental Results
The simulated work is performed on Matlab on Intel core i3 processor.
reading data for encryption...
data to be hide:
***************************************************************************
PREETI
**************************************************************************
**************************************************************************
Reading HTML page for encryption...
Data to be hide after huffman compression:
**************************************************************************
huff_data =00001111010001
Original message length: 48bits
Compressed message: length: 14bits
***************************************************************************
<---------------------------------------------------------------------------------------------->
Encrypting data in html....
*************************************************************************
hiding "0" in string
orignal string
<img src="./RKGIT-College, Ghaziabad_files/logo.jpg" width="498" height="65px" border="0" alt="RKGIT
Logo"> encypted string
<img src="./RKGIT-College, Ghaziabad_files/logo.jpg" width="498" height="65px" border="0" alt="RKGIT
Logo">
***************************************************************************
hiding "0" in string
orignal string
<img src="./RKGIT-College, Ghaziabad_files/sp.png" alt="" width="12" height="30" border="0">
encypted string
<img src="./RKGIT-College, Ghaziabad_files/sp.png" alt="" width="12" height="30" border="0">
*********************************************************************
hiding "0" in string
orignal string
<img src="./RKGIT-College, Ghaziabad_files/sp.png" alt="" width="12" height="30" border="0">
encypted string
<img src="./RKGIT-College, Ghaziabad_files/sp.png" alt="" width="12" height="30" border="0">
**********************************************************************
hiding "0" in string
orignal string
<img src="./RKGIT-College, Ghaziabad_files/sp.png" alt="" width="12" height="30" border="0">
encypted string
<img src="./RKGIT-College, Ghaziabad_files/sp.png" alt="" width="12" height="30" border="0">
***************************************************************************
hiding "1" in string
orignal string
<img src="./RKGIT-College, Ghaziabad_files/CCT_LOGO.png" width="180" height="120" border="0"
alt="Center for Cloud Technologies (CCT)" title="Center for Cloud Technologies (CCT)">
encypted string
<img src="./RKGIT-College, Ghaziabad_files/CCT_LOGO.png" height="120" width="180" border="0"
alt="Center for Cloud Technologies (CCT)" title="Center for Cloud Technologies (CCT)">
*****************************************************************************
hiding "1" in string
orignal string
<img src="./RKGIT-College, Ghaziabad_files/journal1.png" width="210" height="56" border="0">
encypted string
<img src="./RKGIT-College, Ghaziabad_files/journal1.png" height="56" width="210" border="0">
Decompression:
reading HTML page for encryption...
******************************************
A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With..
DOI: 10.9790/0661-1803037377 www.iosrjournals.org 76 | Page
decrypting data from html....
00001111010000
***************************************
decompression of decypted data...
Msg decoded:
PREETI
Performance Parameter:
 encypt coputational time:1.4895sec
 CR (compression ratio):29.1667%
 decypt coputational time:0.17026sec
 BER (bit error rate):0.0. (10)
VI. Conclusion
Web page Steganography is new era of hiding data and it gives more feasibility to hide data because
there is large number of pages available on the internet & data hidden behind web pages is less suspicious. In
our work, we proposed an enhanced cryptosystem which may be more secure as well as having the largest
embedding capacity. Because information security is most important so to do this we use one compression
techniques along with one encryption techniques. So that large amount of data can be handling easily and
transferable behind web pages easily and securely. But now in era of internet web pages are more transferable or
sharable easily between two users, no one can access these secret data. So web page steganography might be a
good carrier of transmission of secure data. For the text Steganography various methods have been proposed. In
this paper, we propose a novel approach of text Steganography that uses the html tags and attributes to hide the
secret messages. The basic idea of the proposed technique is to hide the messages by changing the order of
attributes as the ordering of attributes does not affect the appearance of the html documents. The html
documents are fundamental elements of the web.
These documents are used very commonly on the internet and hence are less prone to arouse suspicion
in the intruder of the existence of the secret message. Moreover, any html document has a considerable number
of tags and attributes. Thus the capacity of the hiding process to hide secret messages is also high in the
proposed technique.
VII. Future Scope
Future work will include investigating the application and efficiency of these methods, and the methods
utilizing HTML document. Here we can apply arithmetic coding for compression as well as DES or RSA
encryption technique to amend the result. This is the future enhancements of the work.
References
Journal Papers:
[1] Petitcolas, Fabien AP, Ross J. Anderson, and Markus G. Kuhn. "Information hiding-a survey." Proceedings of the IEEE 87.7
(1999): 1062-1078.
[2] Dhanani, Chintan. "HTML Steganography using Relative links & Multi web-page Embedment." International Journal of
Engineering Development and Research. Vol. 2. No. 2 (June 2014). IJEDR, 2014.
[3] Dhawase, Dhammjyoti V., and Sachin Chavan. "WEBPAGE INFORMATION HIDING USING PAGE CONTENTS."
[4] Yang, Yujun, and Yimei Yang. "An efficient webpage information hiding method based on tag attributes." Fuzzy Systems and
Knowledge Discovery (FSKD), 2010 Seventh International Conference on. Vol. 3. IEEE, 2010.
[5] Huang, Huajun, Shaohong Zhong, and Xingming Sun. "Steganalysis of information hidden in webpage based on higher-order
statistics." Electronic Commerce and Security, 2008 International Symposium on. IEEE, 2008.
[6] Odeh, Ammar, et al. "Novel Steganography over HTML Code." Innovations and Advances in Computing, Informatics, Systems
Sciences, Networking and Engineering. Springer International Publishing, 2015. 607-611.
[7] Ren, Junling, and Li Zhang. "Webpage Information Hiding Algorithm Based on Integration of Tags and Data." ICICA (LNCS).
2012
[8] Shen, Dongsheng, and Hong Zhao. "A novel scheme of webpage information hiding based on attributes." Information Theory and
Information Security (ICITIS), 2010 IEEE International Conference on. IEEE, 2010.
[9] Yong, Xie, Li Juan, and Zhang Yilai. "A High Capacity Information Hiding Method for Webpage Based on Tag." Digital
Manufacturing and Automation (ICDMA), 2012 Third International Conference on. IEEE, 2012.
[10] Al-Hamami, A. H., M. S. Al-Hakeem, and M. A. Al-Hamami. "A proposed method to hide text inside HTML web page file."
(2009).
[11] Mir, Nighat, and Sayed Afaq Hussain. "Secure web-based communication."Procedia Computer Science 3 (2011): 556-562.
[12] Inoue, Shingo, et al. "A proposal on information hiding methods using XML."The 1st Workshop on NLP and XML. 2001.
[13] P. Niels and H. Peter, "Hide and seek: An introduction to steganography," Security & Privacy, IEEE, vol. 1, pp. 32-44, 2003.
A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With..
DOI: 10.9790/0661-1803037377 www.iosrjournals.org 77 | Page
[14] C. Abbas, C. Joan, C. Kevin, and M. K. Paul, "Digital image steganography: Survey and analysis of current methods," Signal
Processing, vol. 90, pp. 727-752, 2010.
[15] D. Poulami, B. Debnath, and K. Tai-hoon, "Data Hiding in Audio Signal: A Review," International journal of database theory and
application, vol. 2, pp. 1-8, 2009.
[16] A. Odeh, A. Alzubi, Q. Bani, and K. Elleithy, "Steganography by multipoint Arabic letters," in Systems, Applications and
Technology Conference (LISAT), 2012 IEEE Long Island, 2012, pp. 1-7.
[17] A. Odeh, K. Elleithy, and M. Faezipour, "Text Steganography Using Language Remarks," presented at the The American Society of
Engineering Education, 2013.
[18] A. Odeh and K. Elleithy, "Steganography in Arabic Text Using Zero Width and Kashidha Letters," International Journal of
Computer Science & Information Technology (IJCSIT),, vol. 4, pp. 1-11, 2012.
[19] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding”, IBM Systems Journal, vol. 35, Issues 3&4, 1996, pp.
313-336.
[20] T. Moerland, “Steganography and Steganalysis”, www.liacs.nl/home/tmoerlan/privtech.pdf, May 15, 2003.pp. 243-254). IEEE.
[21] R.E. Moore, Interval analysis (Englewood Cliffs, NJ: Prentice-Hall, 1966).

More Related Content

What's hot

A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hidingijcses
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganographyMahmut Yildiz
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 

What's hot (20)

A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
Steganography
SteganographySteganography
Steganography
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
 
G018143943
G018143943G018143943
G018143943
 
Cryptography and Steganography
Cryptography and SteganographyCryptography and Steganography
Cryptography and Steganography
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 

Viewers also liked

Satin bridesmaid dresses gudeer.com
Satin bridesmaid dresses   gudeer.comSatin bridesmaid dresses   gudeer.com
Satin bridesmaid dresses gudeer.comGudeer Kitty
 
Cheap cocktail dresses affordable cocktail gowns gudeer.com
Cheap cocktail dresses   affordable cocktail gowns   gudeer.comCheap cocktail dresses   affordable cocktail gowns   gudeer.com
Cheap cocktail dresses affordable cocktail gowns gudeer.comGudeer Kitty
 
Image Storage, Indexing and Recognition
Image Storage, Indexing and RecognitionImage Storage, Indexing and Recognition
Image Storage, Indexing and RecognitionAdeel Riaz
 
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02Marioly Ch
 
vega rochat cv 2014
vega rochat cv 2014vega rochat cv 2014
vega rochat cv 2014vega rochat
 
Ngủ ngon, ngủ đủ giấc mang lại lợi ích lớn lao
Ngủ ngon, ngủ đủ giấc mang lại lợi ích lớn laoNgủ ngon, ngủ đủ giấc mang lại lợi ích lớn lao
Ngủ ngon, ngủ đủ giấc mang lại lợi ích lớn laogeoffrey363
 
vega rochat portfolio 2014
vega rochat portfolio 2014vega rochat portfolio 2014
vega rochat portfolio 2014vega rochat
 

Viewers also liked (20)

N017327985
N017327985N017327985
N017327985
 
E012142024
E012142024E012142024
E012142024
 
Q01754118128
Q01754118128Q01754118128
Q01754118128
 
Love Me Like You Do
Love Me Like You DoLove Me Like You Do
Love Me Like You Do
 
Satin bridesmaid dresses gudeer.com
Satin bridesmaid dresses   gudeer.comSatin bridesmaid dresses   gudeer.com
Satin bridesmaid dresses gudeer.com
 
K012546981
K012546981K012546981
K012546981
 
Cheap cocktail dresses affordable cocktail gowns gudeer.com
Cheap cocktail dresses   affordable cocktail gowns   gudeer.comCheap cocktail dresses   affordable cocktail gowns   gudeer.com
Cheap cocktail dresses affordable cocktail gowns gudeer.com
 
Image Storage, Indexing and Recognition
Image Storage, Indexing and RecognitionImage Storage, Indexing and Recognition
Image Storage, Indexing and Recognition
 
D011121524
D011121524D011121524
D011121524
 
A010310107
A010310107A010310107
A010310107
 
H012264250
H012264250H012264250
H012264250
 
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
Psicologadelmexicanoeneltrabajo 150301191810-conversion-gate02
 
L010419197
L010419197L010419197
L010419197
 
J012326671
J012326671J012326671
J012326671
 
vega rochat cv 2014
vega rochat cv 2014vega rochat cv 2014
vega rochat cv 2014
 
curriculam vitae
curriculam vitaecurriculam vitae
curriculam vitae
 
Ngủ ngon, ngủ đủ giấc mang lại lợi ích lớn lao
Ngủ ngon, ngủ đủ giấc mang lại lợi ích lớn laoNgủ ngon, ngủ đủ giấc mang lại lợi ích lớn lao
Ngủ ngon, ngủ đủ giấc mang lại lợi ích lớn lao
 
Greence
GreenceGreence
Greence
 
V01231134138
V01231134138V01231134138
V01231134138
 
vega rochat portfolio 2014
vega rochat portfolio 2014vega rochat portfolio 2014
vega rochat portfolio 2014
 

Similar to L1803037377

APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsLisa Brewer
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
Data Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano SystemsData Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano Systemsrinzindorjej
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
 
Securing Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image ShieldingSecuring Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image ShieldingKamal Pradhan
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On SteganographyBryce Nelson
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 

Similar to L1803037377 (20)

APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
F1803023843
F1803023843F1803023843
F1803023843
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
H017255560
H017255560H017255560
H017255560
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
Data Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano SystemsData Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano Systems
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
Securing Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image ShieldingSecuring Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image Shielding
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
C011121114
C011121114C011121114
C011121114
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

L1803037377

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. III (May-Jun. 2016), PP 73-77 www.iosrjournals.org DOI: 10.9790/0661-1803037377 www.iosrjournals.org 73 | Page A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With Compression Based Technique Ram Krishna Singh1 , Bhavya Alankar2 1 (Research Scholar, Computer Science, Jamia Hamdard, India) 2 (Assistant Professor, Computer Science, Jamia Hamdard, India) Abstract: Cryptography, Steganography and Watermarking are three rudimentary techniques which will avail us to secure data from unauthorized access. Steganography is one of the best techniques to obnubilate message from unauthorized users. It is utilized to obnubilate data through sundry medium like audio, video, Text and image. In our research work, we fixate on text Steganography through html web pages to obnubilate data behind it. Because html pages are facilely transferable that contains secret data behind it. There are sundry methods of web pages predicated Steganography. Some of the mundane methods are white spaces, order of attributes, change case letter, change quotation marks, reiterate attributes to obnubilate data etc. But these all methods have some inhibition like iota of data can be obnubilated behind html page & do not have most sizably voluminous embedding capacity etc. To surmount or enhance these circumscriptions we optate to apply any compression technique afore embedding process so that it can obnubilate substantial amount of data and secondly security is much more consequential thus we have to apply any encryption techniques so that data cannot transferable in its pristine form. Thus in our research work we fixates on embedding techniques, compression and encryption techniques. So that system will be more power full as well as secure. Keywords: Compression Ratio, Embedding Technique, Encryption, Huffman Algorithm, Steganography. I. Introduction With the rapid development of internet era, the information plays a consequential role. The information is sent and received from one place to another. So the main aspect is to secure that information. Thus sundry techniques including Steganography, cryptography etc. is utilized to secure information over the cyber world. Steganography is a technique for securing information by obnubilating it in some other medium, cryptography is the science of converting the messages that are intended to be secret into some other form, such that it is not understandable to anyone other than the intended sender and recipients. Steganography is a Greek word which betokens concealed inditing or obnubilated inditing. Steganography is an art and science of encoding obnubilated messages in such a way that no one accepts the sender and recipient ken about the subsistence of the data. In Steganography an unauthorized person cannot able to optically discern the message because message is obnubilated in carrier and peregrinate through the carrier. The carrier of the message may be plain text, image, audio, video etc. Text predicated Steganography techniques can be applied on webpage text and plaintext. WWW pages have become the main way to provide the information for users. A webpage text contains HTML, CSS, XML, and JavaScript as content. The bearer record postulates an imperative part in outlining Steganography calculations. Picture, sound, video, and content are distinctive media utilized as often as possible over the Internet [13]. Each of these conveyor documents sorts has certain attributes that empower the client to embed the information inside. Picture documents are the most broadly utilized records as bearer documents which contain high proportion of information recurrence [14]. Then again, it is arduous to utilize the same picture to stow away distinctive messages, since contrasting comparative pictures may sanction assailants with unearth the covered information. Sound documents are verbalized with as sine or cosine waves. A few methods propose to move the stage to conceal zeros and ones [15]. Content documents verbalize with the most onerous conveyor records, since content documents contain minimal perpetual information contrasted with different bearers [16]. Content Steganography is grouped into sundry classes. A standout amongst the most prominent content Steganography strategies is semantic Steganography [17]. This procedure makes utilization of equipollent words in the same dialect or comparative dialects, for example, American English and British English. This is culminated by making a lexicon of equipollent words and trading words to pass zero or one. Different relegations conceal information relying upon the dialect sentence structure. This is kenned as the most punctual procedures that utilize the physical configuration of content to obnubilate data. Different situations utilize phonetic properties to shroud information and rely on upon the document era to pass on the data [18].
  • 2. A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With.. DOI: 10.9790/0661-1803037377 www.iosrjournals.org 74 | Page II. Types Of Steganography There are many types of Steganography methods. Fig. 1.2 below shows four main categories that can be utilized for Steganography techniques viz text, audio, video and image Steganography. 1) Text Steganography: It obnubilates the text abaft some other text file or HTML Page. It is an arduous form of Steganography as the redundant amount of text to obnubilate the secret message is scarce in text files. 2) Image Steganography: It is one of the most commonly used techniques because of the constraint of the Human visual System (HVS). Human ocular perceiver cannot detect the astronomical range of colors and a nugatory vicissitude in the quality of an image that results from Steganography. 3) Audio Steganography: It is additionally an arduous form of Steganography as humans are able to detect a minute transmutation in the quality of audio. Fig 1: Types of Steganography III. Motivation For Web Steganography As the information is transmitted over the cyber world so security of information is most paramount. The web page is most consequential carrier for travelling the information because web pages are facilely transferring from one place to another place no one can visually perceive the information. Albeit there are many techniques for transfer the information like image, audio, and video etc. But html predicated Steganography is facile and secure technique IV. Framework Of The Proposed Technique The proposed technique essentially has the following schema. It depicts the fundamental flow of the both the obnubilating and extracting process of the proposed technique. Here we used adaptive Huffman coding for the compression. An adaptive Huffman algorithm withal called dynamic Huffman coding. A variation called adaptive Huffman coding involves calculating the probabilities dynamically predicated on recent genuine frequencies in the sequence of source symbols, and transmuting the coding tree structure to match the updated probability estimates. It is utilized infrequently in practice, since the cost of updating the tree makes it more gradual than optimized. Adaptive arithmetic coding that is more flexible and has a better compression. Fig 2: proposed framework.
  • 3. A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With.. DOI: 10.9790/0661-1803037377 www.iosrjournals.org 75 | Page V. Experimental Results The simulated work is performed on Matlab on Intel core i3 processor. reading data for encryption... data to be hide: *************************************************************************** PREETI ************************************************************************** ************************************************************************** Reading HTML page for encryption... Data to be hide after huffman compression: ************************************************************************** huff_data =00001111010001 Original message length: 48bits Compressed message: length: 14bits *************************************************************************** <----------------------------------------------------------------------------------------------> Encrypting data in html.... ************************************************************************* hiding "0" in string orignal string <img src="./RKGIT-College, Ghaziabad_files/logo.jpg" width="498" height="65px" border="0" alt="RKGIT Logo"> encypted string <img src="./RKGIT-College, Ghaziabad_files/logo.jpg" width="498" height="65px" border="0" alt="RKGIT Logo"> *************************************************************************** hiding "0" in string orignal string <img src="./RKGIT-College, Ghaziabad_files/sp.png" alt="" width="12" height="30" border="0"> encypted string <img src="./RKGIT-College, Ghaziabad_files/sp.png" alt="" width="12" height="30" border="0"> ********************************************************************* hiding "0" in string orignal string <img src="./RKGIT-College, Ghaziabad_files/sp.png" alt="" width="12" height="30" border="0"> encypted string <img src="./RKGIT-College, Ghaziabad_files/sp.png" alt="" width="12" height="30" border="0"> ********************************************************************** hiding "0" in string orignal string <img src="./RKGIT-College, Ghaziabad_files/sp.png" alt="" width="12" height="30" border="0"> encypted string <img src="./RKGIT-College, Ghaziabad_files/sp.png" alt="" width="12" height="30" border="0"> *************************************************************************** hiding "1" in string orignal string <img src="./RKGIT-College, Ghaziabad_files/CCT_LOGO.png" width="180" height="120" border="0" alt="Center for Cloud Technologies (CCT)" title="Center for Cloud Technologies (CCT)"> encypted string <img src="./RKGIT-College, Ghaziabad_files/CCT_LOGO.png" height="120" width="180" border="0" alt="Center for Cloud Technologies (CCT)" title="Center for Cloud Technologies (CCT)"> ***************************************************************************** hiding "1" in string orignal string <img src="./RKGIT-College, Ghaziabad_files/journal1.png" width="210" height="56" border="0"> encypted string <img src="./RKGIT-College, Ghaziabad_files/journal1.png" height="56" width="210" border="0"> Decompression: reading HTML page for encryption... ******************************************
  • 4. A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With.. DOI: 10.9790/0661-1803037377 www.iosrjournals.org 76 | Page decrypting data from html.... 00001111010000 *************************************** decompression of decypted data... Msg decoded: PREETI Performance Parameter:  encypt coputational time:1.4895sec  CR (compression ratio):29.1667%  decypt coputational time:0.17026sec  BER (bit error rate):0.0. (10) VI. Conclusion Web page Steganography is new era of hiding data and it gives more feasibility to hide data because there is large number of pages available on the internet & data hidden behind web pages is less suspicious. In our work, we proposed an enhanced cryptosystem which may be more secure as well as having the largest embedding capacity. Because information security is most important so to do this we use one compression techniques along with one encryption techniques. So that large amount of data can be handling easily and transferable behind web pages easily and securely. But now in era of internet web pages are more transferable or sharable easily between two users, no one can access these secret data. So web page steganography might be a good carrier of transmission of secure data. For the text Steganography various methods have been proposed. In this paper, we propose a novel approach of text Steganography that uses the html tags and attributes to hide the secret messages. The basic idea of the proposed technique is to hide the messages by changing the order of attributes as the ordering of attributes does not affect the appearance of the html documents. The html documents are fundamental elements of the web. These documents are used very commonly on the internet and hence are less prone to arouse suspicion in the intruder of the existence of the secret message. Moreover, any html document has a considerable number of tags and attributes. Thus the capacity of the hiding process to hide secret messages is also high in the proposed technique. VII. Future Scope Future work will include investigating the application and efficiency of these methods, and the methods utilizing HTML document. Here we can apply arithmetic coding for compression as well as DES or RSA encryption technique to amend the result. This is the future enhancements of the work. References Journal Papers: [1] Petitcolas, Fabien AP, Ross J. Anderson, and Markus G. Kuhn. "Information hiding-a survey." Proceedings of the IEEE 87.7 (1999): 1062-1078. [2] Dhanani, Chintan. "HTML Steganography using Relative links & Multi web-page Embedment." International Journal of Engineering Development and Research. Vol. 2. No. 2 (June 2014). IJEDR, 2014. [3] Dhawase, Dhammjyoti V., and Sachin Chavan. "WEBPAGE INFORMATION HIDING USING PAGE CONTENTS." [4] Yang, Yujun, and Yimei Yang. "An efficient webpage information hiding method based on tag attributes." Fuzzy Systems and Knowledge Discovery (FSKD), 2010 Seventh International Conference on. Vol. 3. IEEE, 2010. [5] Huang, Huajun, Shaohong Zhong, and Xingming Sun. "Steganalysis of information hidden in webpage based on higher-order statistics." Electronic Commerce and Security, 2008 International Symposium on. IEEE, 2008. [6] Odeh, Ammar, et al. "Novel Steganography over HTML Code." Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering. Springer International Publishing, 2015. 607-611. [7] Ren, Junling, and Li Zhang. "Webpage Information Hiding Algorithm Based on Integration of Tags and Data." ICICA (LNCS). 2012 [8] Shen, Dongsheng, and Hong Zhao. "A novel scheme of webpage information hiding based on attributes." Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on. IEEE, 2010. [9] Yong, Xie, Li Juan, and Zhang Yilai. "A High Capacity Information Hiding Method for Webpage Based on Tag." Digital Manufacturing and Automation (ICDMA), 2012 Third International Conference on. IEEE, 2012. [10] Al-Hamami, A. H., M. S. Al-Hakeem, and M. A. Al-Hamami. "A proposed method to hide text inside HTML web page file." (2009). [11] Mir, Nighat, and Sayed Afaq Hussain. "Secure web-based communication."Procedia Computer Science 3 (2011): 556-562. [12] Inoue, Shingo, et al. "A proposal on information hiding methods using XML."The 1st Workshop on NLP and XML. 2001. [13] P. Niels and H. Peter, "Hide and seek: An introduction to steganography," Security & Privacy, IEEE, vol. 1, pp. 32-44, 2003.
  • 5. A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With.. DOI: 10.9790/0661-1803037377 www.iosrjournals.org 77 | Page [14] C. Abbas, C. Joan, C. Kevin, and M. K. Paul, "Digital image steganography: Survey and analysis of current methods," Signal Processing, vol. 90, pp. 727-752, 2010. [15] D. Poulami, B. Debnath, and K. Tai-hoon, "Data Hiding in Audio Signal: A Review," International journal of database theory and application, vol. 2, pp. 1-8, 2009. [16] A. Odeh, A. Alzubi, Q. Bani, and K. Elleithy, "Steganography by multipoint Arabic letters," in Systems, Applications and Technology Conference (LISAT), 2012 IEEE Long Island, 2012, pp. 1-7. [17] A. Odeh, K. Elleithy, and M. Faezipour, "Text Steganography Using Language Remarks," presented at the The American Society of Engineering Education, 2013. [18] A. Odeh and K. Elleithy, "Steganography in Arabic Text Using Zero Width and Kashidha Letters," International Journal of Computer Science & Information Technology (IJCSIT),, vol. 4, pp. 1-11, 2012. [19] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding”, IBM Systems Journal, vol. 35, Issues 3&4, 1996, pp. 313-336. [20] T. Moerland, “Steganography and Steganalysis”, www.liacs.nl/home/tmoerlan/privtech.pdf, May 15, 2003.pp. 243-254). IEEE. [21] R.E. Moore, Interval analysis (Englewood Cliffs, NJ: Prentice-Hall, 1966).