This document presents a new approach to text steganography that hides a secret message in a cover text by adding or removing extra whitespace (null spaces). The approach converts the secret message into binary and hides each bit by adding an extra space in the cover text for a bit value of 1, or leaving the space unchanged for a bit value of 0. Previous approaches to text steganography include substituting synonyms, abbreviations, or different spellings to encode message bits, but these can alter the meaning of the text. The proposed approach uses whitespace manipulation, which does not affect the meaning or readability of the cover text.
Traid-bit embedding process on Arabic text steganography methodjournalBEEI
The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text. This paper present about traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISONIJNSA Journal
This paper presents three novel approaches of text steganography. The first approach uses the theme of
missing letter puzzle where each character of message is hidden by missing one or more letters in a word
of cover. The average Jaro score was found to be 0.95 indicating closer similarity between cover and
stego file. The second approach hides a message in a wordlist where ASCII value of embedded character
determines length and starting letter of a word. The third approach conceals a message, without
degrading cover, by using start and end letter of words of the cover. For enhancing the security of secret
message, the message is scrambled using one-time pad scheme before being concealed and cipher text is
then concealed in cover. We also present an empirical comparison of the proposed approaches with some
of the popular text steganographic approaches and show that our approaches outperform the existing
approaches.
EXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHYIJNSA Journal
As is commonly known, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders to protect the data from the prying eyes. However, using text as the target medium is relatively difficult as compared to the other target media, because of the lack of available redundant information in a text file. In this paper, in the backdrop of the limitations in the prevalent text based steganographic approaches, we propose simple, yet novel approaches that overcome the same. Our approaches are based on combining the random character sequence and feature coding methods to hide a character. We also analytically evaluate the approaches based on metrics viz. hiding strength, time overhead and memory overhead entailed. As compared to other methods, we believe the approaches proposed impart increased randomness and thus aid higher security at lower overhead.
This document proposes a novel approach for data hiding in web pages using steganography with encryption and compression techniques. It discusses embedding data into HTML web pages by first compressing the data using Huffman coding and then encrypting it before hiding it in the HTML code by modifying attributes like width, height, etc. of images. The proposed method is implemented and experimental results show it achieves high embedding capacity and security by combining compression, encryption and steganography for web pages. Future work could explore using different compression and encryption techniques to improve the results further.
A Review paper on Steganography TechniquesEditor IJMTER
In today’s world the art of sending & displaying the hidden information especially in
public places, has received more attention. And so it has to face many challenges. Therefore,
different methods have been developed so far for hiding information in different cover media.
Steganography is the art and science of invisible communication which takes place between two
different entities. This is done by hiding the information in other information. It is the way of hiding
the existence of the communicated information. Steganography is often confused with cryptography
because the two are similar in the way that they both are used to protect confidential information.
Steganography is different from cryptography. Cryptography focuses on keeping the contents of a
message secret, while steganography focuses on keeping the existence of a message secret [4]. This
paper intends to give an overview of security systems with a main concentration on steganography,
its uses and techniques.
Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...ITIIIndustries
The document proposes a new method for boosting the capacity of web-based steganography by utilizing HTML space codes. It improves upon previous methods by hiding 4 bits per space segment rather than 2 bits, allowing for higher data embedding capacity while maintaining imperceptibility. The method encrypts messages before embedding them in the spaces between text in HTML tags using special space codes. It is evaluated experimentally and shown to have higher capacity than previous approaches while maintaining imperceptibility through minimal changes to file size.
The document proposes two techniques for hiding messages in digital images using steganography. The first technique encodes a secret message using punctuation marks before embedding it in an image. The second uses a modified scytale cipher to arrange the message bits in a grid that is then linearly embedded. Both techniques add an extra layer of protection on top of embedding in the image. Examples are provided demonstrating applying each technique using S-Tools software and analyzing the original versus stego-images.
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
Traid-bit embedding process on Arabic text steganography methodjournalBEEI
The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text. This paper present about traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISONIJNSA Journal
This paper presents three novel approaches of text steganography. The first approach uses the theme of
missing letter puzzle where each character of message is hidden by missing one or more letters in a word
of cover. The average Jaro score was found to be 0.95 indicating closer similarity between cover and
stego file. The second approach hides a message in a wordlist where ASCII value of embedded character
determines length and starting letter of a word. The third approach conceals a message, without
degrading cover, by using start and end letter of words of the cover. For enhancing the security of secret
message, the message is scrambled using one-time pad scheme before being concealed and cipher text is
then concealed in cover. We also present an empirical comparison of the proposed approaches with some
of the popular text steganographic approaches and show that our approaches outperform the existing
approaches.
EXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHYIJNSA Journal
As is commonly known, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders to protect the data from the prying eyes. However, using text as the target medium is relatively difficult as compared to the other target media, because of the lack of available redundant information in a text file. In this paper, in the backdrop of the limitations in the prevalent text based steganographic approaches, we propose simple, yet novel approaches that overcome the same. Our approaches are based on combining the random character sequence and feature coding methods to hide a character. We also analytically evaluate the approaches based on metrics viz. hiding strength, time overhead and memory overhead entailed. As compared to other methods, we believe the approaches proposed impart increased randomness and thus aid higher security at lower overhead.
This document proposes a novel approach for data hiding in web pages using steganography with encryption and compression techniques. It discusses embedding data into HTML web pages by first compressing the data using Huffman coding and then encrypting it before hiding it in the HTML code by modifying attributes like width, height, etc. of images. The proposed method is implemented and experimental results show it achieves high embedding capacity and security by combining compression, encryption and steganography for web pages. Future work could explore using different compression and encryption techniques to improve the results further.
A Review paper on Steganography TechniquesEditor IJMTER
In today’s world the art of sending & displaying the hidden information especially in
public places, has received more attention. And so it has to face many challenges. Therefore,
different methods have been developed so far for hiding information in different cover media.
Steganography is the art and science of invisible communication which takes place between two
different entities. This is done by hiding the information in other information. It is the way of hiding
the existence of the communicated information. Steganography is often confused with cryptography
because the two are similar in the way that they both are used to protect confidential information.
Steganography is different from cryptography. Cryptography focuses on keeping the contents of a
message secret, while steganography focuses on keeping the existence of a message secret [4]. This
paper intends to give an overview of security systems with a main concentration on steganography,
its uses and techniques.
Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...ITIIIndustries
The document proposes a new method for boosting the capacity of web-based steganography by utilizing HTML space codes. It improves upon previous methods by hiding 4 bits per space segment rather than 2 bits, allowing for higher data embedding capacity while maintaining imperceptibility. The method encrypts messages before embedding them in the spaces between text in HTML tags using special space codes. It is evaluated experimentally and shown to have higher capacity than previous approaches while maintaining imperceptibility through minimal changes to file size.
The document proposes two techniques for hiding messages in digital images using steganography. The first technique encodes a secret message using punctuation marks before embedding it in an image. The second uses a modified scytale cipher to arrange the message bits in a grid that is then linearly embedded. Both techniques add an extra layer of protection on top of embedding in the image. Examples are provided demonstrating applying each technique using S-Tools software and analyzing the original versus stego-images.
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
The document discusses steganography, which is hiding messages within other files or signals in a way that is not detectable. It defines steganography as "the art of hiding messages in such a way that no one but the sender and the intended recipient knows about the very existence of the message." The document outlines different forms of steganography including hiding information in text, images, audio and video files. It also discusses some known uses of steganography such as economic espionage, terrorism, and child pornography.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
Text Steganography Using Compression and Random Number GeneratorsEditor IJCATR
A lot of techniques are used to protect and hide information from any unauthorized users such as Steganography and Cryptography. Steganography hides a message inside another message without any suspicion, and Cryptography scrambles a message to conceal its contents. This paper uses a new text steganography that is applicable to work with different languages, the approach, based on the Pseudorandom Number Generation (PRNG), embeds the secret message into a generated Random Cover-text. The output (Stego-Text) is compressed to reduce the size. At the receiver side the reverse of these operations must be carried out to get back the original message. Two secret keys (Hiding Key & Extraction Key) for authentication are used at both ends in order to achieve a high level of security. The model has been applied to different message languages and both encrypted and unencrypted messages. The experimental results show the model‟s capacity and the similarity test values.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
Text hiding in text using invisible character IJECEIAES
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stegoobject. This study uses an invisible character (white space) position of in the cover text that used to hide the the secrete sender masseges. The experiments results show that the suggested method presents highly secret due to use the multi-level of complexity to avoid the attackers.
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
This document presents a technique that uses cryptography and steganography for protecting data. The cryptography stage uses the Playfair cipher to encrypt the secret message. In the steganography stage, the Playfair cipher text is converted to binary and the bits are embedded in the least significant bits of pixels in a cover image. The proposed algorithm first encrypts the message with Playfair cipher using a secret key, then converts the cipher text and cover image to binary and embeds the bits of the encrypted message in the cover image pixels. Experimental results on different types of images show that the technique achieves good security without noticeable distortion of the stego images, as measured by high PSNR values.
This document is a seminar report on steganography presented by Tumma Ashwin to fulfill requirements for a B.Tech degree in Computer Engineering. It includes an introduction to steganography, principles of hiding data, types of steganography techniques, and methods for sending stego files across a network. The report was guided by Prof. S. U. Ghumbre and certifies that Tumma Ashwin completed the project work.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A MULTI-LAYER ARABIC TEXT STEGANOGRAPHIC METHOD BASED ON LETTER SHAPINGIJNSA Journal
The document presents a multi-layer text steganography method for hiding information in Arabic text documents. The method uses natural language processing and letter shaping techniques to embed bits in Arabic letters while maintaining visual imperceptibility. Letters are grouped into layers based on their part-of-speech tags. Bits from the secret message are then hidden by reshaping letters in each layer according to their position in the word. The method aims to improve security, hiding capacity, and imperceptibility over existing Arabic text steganography approaches.
Enhanced Secret Communication Using Multilevel Audio Steganographyijceronline
This document summarizes a research paper on multilevel audio steganography. The paper proposes two types of multilevel steganography models (TYPE-I and TYPE-II) to increase security and capacity. TYPE-I embeds a single message into multiple covers, while TYPE-II embeds multiple messages into a single cover. The paper describes the encoding and decoding process for each model using examples. It also presents experimental results on imperceptibility, capacity, and security of the proposed schemes using audio clips, finding the embedded audio maintains similar quality to original clips.
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
Review on Encrypted Image with Hidden Data Using AES AlgorithmEECJOURNAL
Steganography is the art of hiding the fact where communication is taking place, by hiding information in other information. Steganography becomes more important as more people join the cyberspace revolution. . In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. Steganography include an array of secret communication methods that hide the message from being seen or discovered. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. In addition to this our project also adds security to both the data hidden and the image that carries the information. Security is provided by Encrypting the data that is sent in the image and again encrypting the image that carries the information using AES algorithm. This encryption of the data and image thus provides double security layer.
Securing Web Communication Using Three Layer Image ShieldingKamal Pradhan
The internet has revolutionized all forms of communication since the beginning of its existence and serves an important role in data transmission and sharing. Since the rapid growth of internet, information privacy and security have become the most important issues in today’s world. Since the last 2 decades many information hiding techniques have been developed such as digital watermarking, Cryptography and Steganography. Watermarking is the process of embedding a message on a host signal. It has the additional requirement of robustness against possible attacks. A watermark can be either visible or invisible. Using digital watermarking, copyright information can be embedded into the multimedia data Information such the serial number, images or text with special significance can be embedded. The function of this information can be for copyright protection, secret communication, authenticity and distinguishing of data file, etc [1].
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses enhancing power system restoration in a restructured power system using hydrogen energy storage and a unified power flow controller. It proposes using a proportional-double integral controller optimized with a bacterial foraging algorithm for automatic generation control. The controller aims to improve power system restoration indices and reduce restoration time to improve reliability. Hydrogen energy storage and unified power flow control are introduced to provide fast response to load changes and improve power transfer limits to facilitate faster restoration.
Mining Approach for Updating Sequential PatternsIOSR Journals
This document describes an algorithm for incrementally mining sequential patterns from transactional databases when new transactions are added. The algorithm aims to minimize I/O and computation requirements by maintaining information on "maximally frequent" and "minimally infrequent" sequences from the original database. When new data arrives, it is combined with the existing maximal and minimal information to determine which portions of the original database need to be re-scanned. This approach improves execution time over fully re-mining the pattern space from scratch.
This document summarizes research comparing two types of ground shields for 60GHz on-chip bandpass filters designed using 0.18μm CMOS technology: complementary split ring resonators (CSRRs) and patterned ground shields. Simulation results showed that the filter using CSRRs as the ground shield produced better performance with an insertion loss of -2.682dB, 3dB bandwidth of 10.8GHz, and center frequency of 56GHz. In comparison, the filter with a patterned ground shield had an insertion loss of -2.77dB and wider 3dB bandwidth of 14GHz but a similar center frequency of 57.5GHz. Both experimental and simulation results agreed reasonably well.
This document describes linking design and manufacturing on a PLM (Product Lifecycle Management) platform. Specifically, an automobile fuel tank cap was modeled in Creo Parametric. An injection mold was then developed for the part. The complete design data was integrated into Windchill PLM software for data and process management. Operations were generated to manufacture the mold cavities and core. The fuel tank cap design was then reviewed in the PLM software by a guest reviewer. This case study demonstrates how PLM software can efficiently manage product design and manufacturing data throughout the entire product lifecycle.
IOSR Journal of Humanities and Social Science is an International Journal edited by International Organization of Scientific Research (IOSR).The Journal provides a common forum where all aspects of humanities and social sciences are presented. IOSR-JHSS publishes original papers, review papers, conceptual framework, analytical and simulation models, case studies, empirical research, technical notes etc.
The document discusses steganography, which is hiding messages within other files or signals in a way that is not detectable. It defines steganography as "the art of hiding messages in such a way that no one but the sender and the intended recipient knows about the very existence of the message." The document outlines different forms of steganography including hiding information in text, images, audio and video files. It also discusses some known uses of steganography such as economic espionage, terrorism, and child pornography.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
Text Steganography Using Compression and Random Number GeneratorsEditor IJCATR
A lot of techniques are used to protect and hide information from any unauthorized users such as Steganography and Cryptography. Steganography hides a message inside another message without any suspicion, and Cryptography scrambles a message to conceal its contents. This paper uses a new text steganography that is applicable to work with different languages, the approach, based on the Pseudorandom Number Generation (PRNG), embeds the secret message into a generated Random Cover-text. The output (Stego-Text) is compressed to reduce the size. At the receiver side the reverse of these operations must be carried out to get back the original message. Two secret keys (Hiding Key & Extraction Key) for authentication are used at both ends in order to achieve a high level of security. The model has been applied to different message languages and both encrypted and unencrypted messages. The experimental results show the model‟s capacity and the similarity test values.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
Text hiding in text using invisible character IJECEIAES
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stegoobject. This study uses an invisible character (white space) position of in the cover text that used to hide the the secrete sender masseges. The experiments results show that the suggested method presents highly secret due to use the multi-level of complexity to avoid the attackers.
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
This document presents a technique that uses cryptography and steganography for protecting data. The cryptography stage uses the Playfair cipher to encrypt the secret message. In the steganography stage, the Playfair cipher text is converted to binary and the bits are embedded in the least significant bits of pixels in a cover image. The proposed algorithm first encrypts the message with Playfair cipher using a secret key, then converts the cipher text and cover image to binary and embeds the bits of the encrypted message in the cover image pixels. Experimental results on different types of images show that the technique achieves good security without noticeable distortion of the stego images, as measured by high PSNR values.
This document is a seminar report on steganography presented by Tumma Ashwin to fulfill requirements for a B.Tech degree in Computer Engineering. It includes an introduction to steganography, principles of hiding data, types of steganography techniques, and methods for sending stego files across a network. The report was guided by Prof. S. U. Ghumbre and certifies that Tumma Ashwin completed the project work.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A MULTI-LAYER ARABIC TEXT STEGANOGRAPHIC METHOD BASED ON LETTER SHAPINGIJNSA Journal
The document presents a multi-layer text steganography method for hiding information in Arabic text documents. The method uses natural language processing and letter shaping techniques to embed bits in Arabic letters while maintaining visual imperceptibility. Letters are grouped into layers based on their part-of-speech tags. Bits from the secret message are then hidden by reshaping letters in each layer according to their position in the word. The method aims to improve security, hiding capacity, and imperceptibility over existing Arabic text steganography approaches.
Enhanced Secret Communication Using Multilevel Audio Steganographyijceronline
This document summarizes a research paper on multilevel audio steganography. The paper proposes two types of multilevel steganography models (TYPE-I and TYPE-II) to increase security and capacity. TYPE-I embeds a single message into multiple covers, while TYPE-II embeds multiple messages into a single cover. The paper describes the encoding and decoding process for each model using examples. It also presents experimental results on imperceptibility, capacity, and security of the proposed schemes using audio clips, finding the embedded audio maintains similar quality to original clips.
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
Review on Encrypted Image with Hidden Data Using AES AlgorithmEECJOURNAL
Steganography is the art of hiding the fact where communication is taking place, by hiding information in other information. Steganography becomes more important as more people join the cyberspace revolution. . In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. Steganography include an array of secret communication methods that hide the message from being seen or discovered. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. In addition to this our project also adds security to both the data hidden and the image that carries the information. Security is provided by Encrypting the data that is sent in the image and again encrypting the image that carries the information using AES algorithm. This encryption of the data and image thus provides double security layer.
Securing Web Communication Using Three Layer Image ShieldingKamal Pradhan
The internet has revolutionized all forms of communication since the beginning of its existence and serves an important role in data transmission and sharing. Since the rapid growth of internet, information privacy and security have become the most important issues in today’s world. Since the last 2 decades many information hiding techniques have been developed such as digital watermarking, Cryptography and Steganography. Watermarking is the process of embedding a message on a host signal. It has the additional requirement of robustness against possible attacks. A watermark can be either visible or invisible. Using digital watermarking, copyright information can be embedded into the multimedia data Information such the serial number, images or text with special significance can be embedded. The function of this information can be for copyright protection, secret communication, authenticity and distinguishing of data file, etc [1].
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses enhancing power system restoration in a restructured power system using hydrogen energy storage and a unified power flow controller. It proposes using a proportional-double integral controller optimized with a bacterial foraging algorithm for automatic generation control. The controller aims to improve power system restoration indices and reduce restoration time to improve reliability. Hydrogen energy storage and unified power flow control are introduced to provide fast response to load changes and improve power transfer limits to facilitate faster restoration.
Mining Approach for Updating Sequential PatternsIOSR Journals
This document describes an algorithm for incrementally mining sequential patterns from transactional databases when new transactions are added. The algorithm aims to minimize I/O and computation requirements by maintaining information on "maximally frequent" and "minimally infrequent" sequences from the original database. When new data arrives, it is combined with the existing maximal and minimal information to determine which portions of the original database need to be re-scanned. This approach improves execution time over fully re-mining the pattern space from scratch.
This document summarizes research comparing two types of ground shields for 60GHz on-chip bandpass filters designed using 0.18μm CMOS technology: complementary split ring resonators (CSRRs) and patterned ground shields. Simulation results showed that the filter using CSRRs as the ground shield produced better performance with an insertion loss of -2.682dB, 3dB bandwidth of 10.8GHz, and center frequency of 56GHz. In comparison, the filter with a patterned ground shield had an insertion loss of -2.77dB and wider 3dB bandwidth of 14GHz but a similar center frequency of 57.5GHz. Both experimental and simulation results agreed reasonably well.
This document describes linking design and manufacturing on a PLM (Product Lifecycle Management) platform. Specifically, an automobile fuel tank cap was modeled in Creo Parametric. An injection mold was then developed for the part. The complete design data was integrated into Windchill PLM software for data and process management. Operations were generated to manufacture the mold cavities and core. The fuel tank cap design was then reviewed in the PLM software by a guest reviewer. This case study demonstrates how PLM software can efficiently manage product design and manufacturing data throughout the entire product lifecycle.
IOSR Journal of Humanities and Social Science is an International Journal edited by International Organization of Scientific Research (IOSR).The Journal provides a common forum where all aspects of humanities and social sciences are presented. IOSR-JHSS publishes original papers, review papers, conceptual framework, analytical and simulation models, case studies, empirical research, technical notes etc.
This document summarizes a study that used artificial neural networks (ANNs) and the Multi-Layer Perceptron model (MLP) to predict the bearing capacities of steel driven piles in sandy soils. The ANN was trained on data from full-scale pile load tests, including pile length, diameter, soil elastic modulus, and soil friction angle as inputs. The output was pile bearing capacity. The study examined factors for effective ANN behavior, trained and tested the network, and analyzed the sensitivity of the inputs on the output capacity prediction.
The document describes a new efficient shower water heater design that uses a novel heat transfer method. Key points:
- The design aims to significantly reduce power consumption compared to conventional electric water heaters by heating water in small volumes directly in the shower head rather than a large reservoir.
- Coiled heating elements housed in small tubes are placed inside the shower head openings so that only a few milliliters of water pass through and are heated at a time.
- This micro heating approach is expected to exponentially reduce the power needed compared to traditional systems that heat larger volumes of water at once.
- Other benefits may include lower hazards, portability, lighter weight, and enabling the use of small renewable power
Modeling Object Oriented Applications by Using Dynamic Information for the I...IOSR Journals
This paper presents an iterative approach to recover collaborations from object-oriented applications using dynamic information. It develops a prototype tool called the Collaboration Browser to demonstrate this approach. The Collaboration Browser allows developers to query runtime information to understand collaborations between classes. It presents dynamic information through panels listing sender classes, receiver classes, invoked methods, and collaboration patterns. Developers can iteratively filter information and focus on specific collaborations. The paper tests the Collaboration Browser on a sample Java application, recovering 19 collaboration patterns by posing 18 queries. It concludes the approach effectively discovers important collaborations and roles classes play within them.
This document summarizes a case study that used the Canadian Seismic Screening Method to evaluate 37 reinforced concrete buildings in Ahlat, Turkey. The screening method uses 8 parameters to calculate a Structural Index and Non-Structural Index for each building, which are then combined to determine a Seismic Priority Index. For the study in Ahlat, 14% of buildings were rated as low priority, 41% as medium priority, 35% as high priority, and 10% as very risky priority. The screening method provided a fast way to assess the seismic risk of numerous buildings and identify which should undergo more detailed evaluation.
1) The document derives the equations describing the interaction forces between two identical cylinders spinning around their stationary and parallel axes in an ideal fluid.
2) It is found that the fluid velocity field can be determined by solving the Laplace equation, and that the pressure field can then be obtained from the velocity field using Bernoulli's equation.
3) By integrating the pressure around the surface of each cylinder, it is shown that the cylinders will repel or attract each other in inverse relation to their separation distance, depending on whether their directions of rotation are the same or opposite.
This document compares communication links between optical fiber and VSAT for offshore platforms. It discusses that optical fiber provides higher speeds, better signal quality, and higher reliability than VSAT, but has higher upfront costs. VSAT can cover larger distances at a lower cost, but has lower speeds and quality. For clusters of platforms near shore, fiber is often preferable due to its performance, but for wide coverage VSAT may be more cost effective despite its limitations. The key factors in choosing a link include cost, capacity, reliability, backup options, and services required.
This document provides an abstract and introduction for a study on the impact of incentives for indigenous farmers (A1 and A2) on maize production in Macheke, Mashonaland East Province, Zimbabwe. The study was motivated by a decline in maize deliveries to the Grain Marketing Board in Macheke despite an increase in the number of farmers. The objectives are to understand why production has dropped and to identify incentives to boost production. The introduction provides background on maize production in Zimbabwe and Mashonaland East Province. It reviews literature on Zimbabwe's "green revolutions" in maize and the current food security challenges. The research design utilizes a mixed methods approach through questionnaires, interviews and review of production and import
This document summarizes a study that measured the field strength distribution of a 91.5 MHz FM radio signal across Ekiti State, Nigeria. Field strength, location coordinates, and distance from transmitter were measured along four routes moving away from the broadcast station. The path loss along each route was calculated using Friis and Okumura-Hata propagation models and compared to measured values. Okumura-Hata provided closer predictions, with a mean error of 2.68dB across routes, suggesting it is more suitable for modeling VHF path loss in Ekiti State when a 2.68dB loss factor is included.
This document discusses using Gamma tone Frequency Cepstral Coefficients (GFCC) and K-means clustering to identify singers based on their voice. It begins by explaining that MFCC is not accurate in noisy environments, while GFCC performs well in both clean and noisy audio. The process involves extracting GFCC features from the audio, using K-means clustering to group similar voices into clusters, and dynamic time warping for authentication. Feature extraction with GFCC involves preprocessing, framing, windowing, computing the discrete Fourier transform, applying a gamma tone filter bank, logarithmic compression, and discrete cosine transformation to generate feature vectors. K-means clustering is then used to group the feature vectors from similar voices into clusters to identify
This document compares the performance of eco-friendly refrigerants R-507, R-407c, and R404a for retrofitting an R-12 vapor compression refrigeration system. It provides thermodynamic property correlations for these refrigerants and analyzes the coefficient of performance (COP) and compressor volumetric efficiency of a 1-ton refrigeration unit using each refrigerant. The results show the COP and efficiency are nearly the same for R-134a, R-507, R404a and R-407c as for R-12, indicating these refrigerants' suitability for retrofitting existing R-12 systems. In conclusion, retrofitting with these refrigerants is a viable option to phase
This document discusses a study on using non-monetary incentives to improve service delivery in public institutions in Tharaka Nithi County, Kenya. The study aimed to examine the effects of tangible rewards, employee recognition, workplace opportunities, and job flexibility on service delivery. It utilized a descriptive research design and collected data through questionnaires and interviews with employees and managers at Chuka University. The findings revealed that the institution did not extensively apply non-monetary incentives to improve service delivery, though limited recognition was used. Most respondents felt incentives were needed to reduce poor service delivery instances. The study recommended recognition, job flexibility, and tangible rewards as low-cost ways to incentivize better performance.
The document proposes a system to bridge socially enhanced virtual communities for business collaborations. The system discovers relevant existing businesses and potential business alliances through a semi-automated approach using broker discovery. Brokers help connect separate groups within a professional virtual community and find new relevant groups to join. Metrics are used to support discovering and selecting brokers to improve interactions, relationships, and trust between members of the virtual communities.
This document summarizes a study on modifying bitumen used in road construction with waste plastics and crumb rubber. The study aims to determine which waste material (PET bottles or crumb rubber) can better modify bitumen properties when added in varying percentages. Marshall stability tests are conducted on bitumen concrete mixes containing 3-9% by weight of either PET bottles or crumb rubber added to the bitumen. The results of the stability tests are used to analyze how the waste materials affect the mechanical properties of the mixes and to identify the optimum percentage to achieve maximum strength.
This document presents a study on using sliding mode control to regulate the speed of a DC motor. It begins with background on variable structure systems and sliding mode control. It then describes the mathematical model of a typical DC motor. The controller design section explains the sliding mode control approach, including defining a sliding surface and the control law. Simulation results are presented showing the motor speed and control voltage signal over time for different sliding mode controllers. The document concludes the sliding mode control technique provides robustness and can stabilize uncertain systems while rejecting disturbances.
This document proposes a new approach to compressed image steganography using wavelet transform. The method embeds a compressed payload image within a cover image using discrete wavelet transform (DWT) for image compression and discrete Fourier transform (DFT) to select pixel locations in the cover image. Five test cases of the approach are described and evaluated. In the first case, DWT is applied to the payload image to get 32x32 approximate coefficients, DFT is applied to the cover image to select pixel locations below a threshold, and the coefficients replace the selected pixel values to create the stego-image. The other cases vary the DWT level, threshold value, and image sizes. Results show the stego-image quality
1. The document presents a novel approach to text steganography that hides secret messages in null spaces of cover text documents.
2. The approach encodes secret message bits as extra null spaces inserted into the cover text plaintext, with one null space representing a 0 bit and two null spaces representing a 1 bit.
3. The encoding is done by a hiding program that generates a stego text file, while an extractor program can recover the secret message from the stego text. The approach aims to covertly communicate secret messages within innocuous-looking text.
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
Analysis Of Different Types Of SteganographyScott Donald
This document analyzes different types of steganography and the techniques used to embed secret messages in various cover media. It discusses how steganography has evolved from ancient times using physical objects like slaves to modern digital steganography. It classifies steganography based on the cover media used - text, images, audio and video. For each type, it describes the various embedding techniques like LSB insertion for images and modifying frequencies for audio. The document provides an overview of the history and methods of steganography.
A Novel Steganography Technique that Embeds Security along with CompressionCSCJournals
Problem faced by today’s communicators is not only security but also the speed of communication. This paper provides a mechanism that increases the speed of communication by reducing the size of content; for this data compression method is used and security factor is added by using Steganography. Firstly, the focus has been made on Data Compression and Steganography. Finally, proposed technique has been discussed. In Proposed technique first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter on compressed data state table operation is applied to improve the security. Then, this is used as the input to the LSB technique of Steganography. At receiver end, firstly the LSB extraction technique is used, thereafter the state table operation in reverse form is applied and finally the original data is obtained. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
A Review Paper On Steganography TechniquesAudrey Britton
This document summarizes different techniques for steganography (hidden communication). It discusses how steganography differs from cryptography in that it focuses on hiding the existence of secret messages rather than just their contents. The document reviews various methods for hiding information in digital images, audio/video files, texts, and network protocols. Specific techniques covered include least significant bit coding, discrete cosine transform in JPEG images, and discrete wavelet transform.
This document summarizes text steganography methods. It begins with a brief history of steganography from ancient times to modern uses. It then discusses text steganography specifically, including format-based, linguistic, and random/statistical generation methods. Examples of text steganography techniques are provided, such as selective hiding, hiding using whitespace, and semantic hiding using synonyms. The basic mechanism of text steganography is outlined as concealing a secret message in cover text using an embedding algorithm, transmitting the stego-text, and extracting the secret message using a recovery algorithm and stego-key at the receiving end.
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISONIJNSA Journal
The document describes three novel approaches to text steganography and compares them to existing approaches. The first approach hides each character of a secret message in a word by missing one or two letters in the word depending on the character's ASCII value. The second approach hides the message in a list of words where the starting letter and length of each word is determined by the ASCII value of the character to hide. The third approach conceals secret bits using the start and end letters of words in a pre-existing cover text like a newspaper article. Empirical results showed that the proposed approaches outperform popular existing text steganography methods.
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...IJERA Editor
Steganography and cryptography are main tools for secure the information. The integration of steganography
with cryptography to secure communication, is an application that integrate Steganography techniques with
Cryptography techniques to get more secure communication method. This paper aim to design a system with
more sturdy security, by hybrid AES cryptography and text steganography. In this paper we proposed a method
that encrypt secret message and then embedding it in cover text. This done by scrambled secret message first
through AES encryption algorithm then hiding it into Arabic cover text. This paper also study the efficient
embedding technique that can be used for hiding the encrypted data in cover text to hide it from attackers and
sent message to the receiver in a safe mode.
This document is a self-study seminar report on steganography presented by Abhishek Singh. It includes an introduction to steganography, its importance, and a literature review on different steganographic techniques. The introduction defines steganography as hidden writing and discusses why it is important for secret communications. The literature review covers steganography methods in text, audio, images, and networks. It also discusses steganalysis, applications of steganography, and how it compares to cryptography.
This document provides a tutorial review of steganography techniques. It begins with an abstract discussing the growth of digital communication and the need for information security, with steganography playing an important role. It then reviews steganography techniques in 3 sections - past, present and future. For the past, it discusses the origins and early uses of steganography throughout history. For the present, it outlines the main types of modern steganography techniques using different media. And for the future, it discusses challenges like steganalysis and potential solutions involving cryptography and dual steganography. The document then provides details on specific techniques for hiding information in text, images, audio and video files.
This document provides an overview of steganography, including its history and various techniques. It discusses steganography in text, images, and audio files. Text steganography can hide messages by making minor spelling or grammatical changes. Image steganography embeds data in the least significant bit of image pixels. Audio steganography utilizes properties of human hearing to conceal messages. The document also covers applications, tools, and the future potential of steganography.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a ciphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
The document provides an overview of steganography, including its definition, history, techniques, applications, and future scope. It discusses different types of steganography such as text, image, and audio steganography. For image steganography, it describes techniques such as LSB insertion and compares image and transform domain methods. It also provides examples of steganography tools and their usage for confidential communication and data protection.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
The word steganography has Greek origins and means ‘concealed writing.’
The original practice can be traced back to around 440 BC when the ancient Greeks hid messages within wax tablets by writing messages on the wood before applying a wax surface (Herodotus 1987).
Another early recorded use of steganography occurred in ancient Greece when messengers tattooed messages on their shaved heads and concealed the messages with the hair that grew over them afterwards, a technique also used by German spies in the early 20th century (Newman 1940).
The document discusses the history and techniques of information hiding, specifically steganography. It describes how steganography has evolved from ancient Greece using wax tablets and tattoos to modern digital methods of hiding information in images, audio and other media. It outlines some key terminology and concepts in steganography, such as cover objects, stego objects and stegosystems. The document also discusses the tradeoff between security and payload capacity and examines linguistic steganography and its relationship to digital watermarking.
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document summarizes an academic paper on audio steganography techniques using discrete wavelet transformation (DWT) and discrete cosine transformation (DCT). It begins with an abstract of the paper and an introduction to steganography. It then covers classifications of steganography, advantages and disadvantages of audio steganography, applications, and requirements of efficient steganography techniques. Finally, it discusses features of the human auditory system important for audio steganography and describes various audio steganography techniques in both the time and frequency domains.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
Similar to A Novel Approach of Text Steganography based on null spaces (20)
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Best 20 SEO Techniques To Improve Website Visibility In SERP
A Novel Approach of Text Steganography based on null spaces
1. IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 4 (July-Aug. 2012), PP 11-17
www.iosrjournals.org
www.iosrjournals.org 11 | Page
“A Novel Approach of Text Steganography based on null spaces”
Prem Singh, Rajat Chaudhary and Ambika Agarwal
Department of Information Technology, DIT (Uttrakhand Technical University)
Abstract: Steganography is the art and science of covered or hidden writing. The purpose of steganography is
covert communication to hide the existence of a message from an intermediary. Digital Steganography
algorithms have been developed by using texts, images and audio etc as the cover media. In this approach, a
security model is proposed which imposes the concept of secrecy over privacy for text messages. In the recent
years, we have plenty of security tools which are developed to protect the transmission of multimedia objects.
But approaches for the security of text messages are comparatively less.
In this approach we present a new approach on text steganography through the null space in the cover
message for hiding the secret message. In this method, hiding bits of secret message is done through adding
extra null spaces in the plaintext of the cover file. These null spaces placed, when the binary bit of secret
message is equal to 1 in plaintext of the cover file. And null space remains unchanged when the binary bit of the
secret message is equal to 0.
Keywords: Steganography, cover message, secret message
I. Introduction:
Steganography is the art and science of writing hidden messages in such a way that no one, apart from
the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos
meaning "covered or protected", and graphein meaning "to write".
Steganography has been widely used, including in recent historical times and the present day. Some
possible known examples include: Hidden messages within wax tablets: in ancient Greece, people wrote
messages on the wood, and then covered it with wax upon which an innocent covering message was written.
Apparently neutral‟s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext
for embargo on by-products, ejecting suits and vegetable oils. By extracting the second letter from each word,
this hidden message can be decoded as:
Pershing sails from NY June 1. [1]
The development of new digital technologies has given an opportunity to improve message detection
that can pass more information and even be less conspicuous in transmission such as the microdots technology
developed by the Germans. Microdots uses microscopic shrink technique to hide pictures of text which can only
be read using a microscope. German spies used them in many different ways like messages hidden in letters, on
the face of watches and even on spotted ties.
The application of computer in real life is increasing day by day. So, the need to secure data is
becoming more and more essential part of message or data transfer. Information security became a part of our
daily life. Among the different techniques, hidden exchange of information is one of the concerns in the area of
information security. Various methods like Cryptography, steganography, coding and so on have been used for
this purpose. However, during recent years, steganography, perhaps has attracted more attention than others.
In implementing steganography, the main objective of Steganography is to hide the information under a
cover media so that the outsiders may not discover the information contained in the said media. This is the
major distinction between Steganography and other methods of hidden exchange of information. For example,
in cryptography method, people become aware of the existence of data by observing coded data, although they
are unable to comprehend the data. However, in Steganography, nobody notices the existence of data in the
resources.
Most Steganography works have been performed on images, video clips, text, music and sounds.
However text Steganography is the most difficult kind of Steganography; this is due to the lack of redundant
information in a text file, while there is a lot of redundancy in a picture or a sound file, which can be used in
Steganography. In this approach we presents a new approach on text steganography through the white/null space
in the cover message for hiding the secret message. In this method, hiding bits of secret message is done through
adding extra white/null spaces in the plaintext of the cover file. These white/null spaces placed, when the binary
bit of secret message is equal to 1 in plaintext of the cover file. And white/null space remains unchanged when
the binary bit of the secret message is equal to 0.
2. “A Novel Approach of Text Steganography based on null spaces”
www.iosrjournals.org 12 | Page
The structure of text documents is identical with what we observe, while in other types of documents
such as in a picture, the structure of document is different from what we observe. Therefore, in such documents,
we can hide information by introducing changes in the structure of the document without making a notable
change in the concerned output.
Text Steganography is one of the most difficult methods because a text file is not a proper media to
hide data in it. Among the most important of these technologies, one can name the hiding information in
electronic texts and documents (e-documents). The use of hiding information in text for web pages is another
example. Text steganography is the art or process of hiding one text into another text for the purpose of secure
communication so that the illegitimate user/ unauthorized user can‟t get the secret message for their own use.
II. Related work:
Before giving a brief description of the related work on Text Steganography, it will be appropriate to
discuss the frequent terms used in this context. The secret message to be hidden is referred to as embedded data
and the innocuous text / audio / image used for embedding is called as cover. The resultant output object after
embedding is referred to as stego-object. It is a priory for the sending and receiving ends to have agreed upon
on a mutual key exchange protocol / mechanism.
A few works have been done on hiding information in texts. Following is the list of different methods
of the works carried out and reported so far.
2.1 In general, the Text Steganography methods can be categorized into two groups:
1- Changing the text format.
2- Changing the meaning of the text.
The methods which are based on the changing the meaning of the text are limited. Some examples of
these methods are as follows:
2.1.1. Syntactic method :
By placing some punctuation marks such as full stop (.) and comma (,) in proper places, one can hide
information in a text file. This method requires identifying proper places for putting punctuation marks. The
amount of information to hide in this method is trivial.
2.1.2. Semantic method :
The authors Mohammad Sirali-Shahreza and M. Hassan Shirali-Shahreza in [8] have used synonym
words substitution for hiding secret message bits on the anology of 2.1-2.2.
This method uses the synonym of certain words thereby hiding information in the text. The synonym
substitution may represent a single or multiple bit combination for the secret information. A major advantage of
this method is the protection of information in case of retyping or using OCR programs. However, this method
may alter the meaning of the text.
TABLE 1 Semantic method
2.1.3. Text abbreviation or acronym :
Another method for hiding information is the use of abbreviations or acronym. Mohammad Sirali-
Shahreza and M.Hassan Shirali-Shahreza from Iran have suggested the use of substitution of words with their
respective abbreviations or viza viz in [6] to hide bits of secret message. Their suggested method operates as
follows:
Acronym
(0)
Translation
(1)
2l8 Too late
ASAP As Soon As Possible
C See
CM Call Me
F2F Face to face
TABLE 2 Text abbreviation or Acronym
Big Large
Small Little
Chilly Cool
Smart Clever
Spaced Stretched
3. “A Novel Approach of Text Steganography based on null spaces”
www.iosrjournals.org 13 | Page
Methodology: A table of two columns is organized with a preselected list of words and their
corresponding acronyms in such a way that the column under which words or its translation will
appear is labeled as „1‟ while that containing respective acronym is labeled as „0‟.The message/information
required to be hidden is converted into its equivalent binary (Table 2 refers for detail).
In this method, very little information can be hidden in the text. For example, only a few bits of
information can be hidden in a file of several kilobytes.In this method words can be substituted with their
abbreviations to represent the binary bit pattern of zero or one corresponding to the bits of secret information.
2.1.4. Change of spelling :
In his research paper [7] Mohammad Shirali-Shahreza presented a method to exploit same words which
are spelled differently in British and American English for hiding secret message bits. The concealment
methodology elaborated below, where the words spelled in British and American English are arranged in
separate columns; is identical to that explained in preceding sub-pera.
Methodology: The column labeled „1‟ contain words with British spellings while that containing same
words of American spelling is given a label „0‟.The secret message is converted into its equivalent binary. The
cover message is then iterated to find words that match to those available in pre-defined list. On finding a
matching word, the secret message bit is mapped to the column headings and the word at the cross-section of
that column and matched word‟s row is substituted in the cover message for the matched word.
Whole of the cover message is iterated to find matching words in the list followed by substitution of
word under column indicated by secret message bit. This method exploits the way words are spelled in British
and American English for hiding secret information bits.
American Spelling British Spelling
Favorite Favourite
Criticize Criticise
Fulfill Fulfil
Center Centre
TABLE 3: Change of Spelling
The methods which change the format of the text usually have a large capacity for hiding information. Some
examples of these methods are as follows:
2.1.5. Line shifting method :
In this method, the lines of the text are vertically shifted to some degree (for example, each line is
shifted 1/300 inch up or down) and information are hidden by creating a unique shape of the text. This method is
suitable for printed texts.
( Figure 4: Line Shifting)
However, in this method, the distances can be observed by using special instruments of distance
assessment and necessary changes can be introduced to destroy the hidden information. Also if the text is
retyped or if character recognition programs (OCR) are used, the hidden information would get destroyed. This
method hides information by shifting the text lines to some degree to represent binary bits of secret information.
2.1.6. Word shifting method :
In this method, by shifting words horizontally and by changing distance between words, information is
hidden in the text. This method is acceptable for texts where the distance between words is varying. This
method can be identified less, because change of distance between words to fill a line is quite common.
( Figure 5: Word Shifting)
But if somebody was aware of the algorithm of distances, he can compare the present text with the
algorithm and extract the hidden information by using the difference. The text image can be also closely studied
to identify the changed distances. Although this method is very time consuming, there is a high probability of
4. “A Novel Approach of Text Steganography based on null spaces”
www.iosrjournals.org 14 | Page
finding information hidden in the text. Retyping of the text or using OCR programs destroys the hidden
information.
2.1.7. Feature coding :
In feature coding method , some of the features of the text are altered. For example, the end part of
some characters such as h, d, b or so on, are elongated or shortened a little thereby hiding information in the
text. In this method, a large volume of information can be hidden in the text without making the reader aware of
the existence of such information in the text.
This method hides the secret information bits by associating certain attributes to the text characters. By placing
characters in a fixed shape, the information is lost. Retying the text or using OCR program destroys the hidden
information.
Some other methods are:
2.1.8. Miscellaneous techniques :
A large number of idiosyncrasies methods have been given by the authors in [9] that may be used for
hiding secret message bits inside a cover text e.g., by introducing modification or injecting deliberate
grammatical word/sentence errors with in text. Some of the suggested techniques / procedures given in this
context include:
(i) Typographical errors - “tehre” rather than “there”.
(ii) Using abbreviations / acronyms - “yr” for “your” / “TC” in place of “Take Care”.
(iii) Transliterations – “gr8” rather than “great”.
2.1.9. Steganography of information in specific characters in words :
In this method, some specific characters from certain words are selected as hiding place for
information. In the simplest form, for example, the first words of each paragraph are selected in a manner that
by placing the first characters of these words side by side, the hidden information is extracted. This has been
done by classic poets of Iran as well.
This method requires strong mental power and takes a lot of time. It also requires special text and not
all types of texts can be used in this method.
2.1.10. HTML tags :
HTML Tags can be used in varying combination or as gaps and horizontal tabulation to represent a
pattern of secret information bits. e.g.,
Stego key:
<img></img> -> 0
<img/> -> 1
Stego data:
<img src=g1.jpg></img>
<img src=g2.jpg/>
<img src=g3.jpg/>
<img src=g4.jpg/>
<img src=g5.jpg></img>
Hidden Bits: 01110
2.1.11. Hiding data by changing case of tag [12][13]:
As already stated, HTML Tags and associated members are case insensitive e.g., <html>, <HTML> or
<hTmL> will have the same impact on the document‟s outlook. Bits are hidden in TAGS by changing the case
of the alphabets based on the bit as either „0‟ or „1‟.
The draw back is that the changes are frequent and besides eye catching these can also be easily
decoded to extract the hidden information in the absence of any pre-agreed stego-key and usage
details.
III. Our approach:
3.1 Block Diagram of given Model:
Here we propose a new hybrid model using white/null space technique to hide the secret message in
text steganography.
5. “A Novel Approach of Text Steganography based on null spaces”
www.iosrjournals.org 15 | Page
Figure8: Broad level steps in Text Steganography
3.2 Working of the given model:
Hiding information within spaces seems to be potential as people hardly can know about the existence
of the hidden bits. This approach shows that one space is interpreted as “0” whereas two spaces are interpreted
as “1”. This embedding scheme was applied in the space which appears between the words. The major
drawback of this method is that it requires a great deal of space to encode few bits. For example, a character is
equivalent of 8 bits, and it requires approximately 8 inter-spaces to encode one character.
Figure9: How Stego-System works
In this approach we present a new approach on text steganography through the white/null space in the
cover message for hiding the secret message.
3.2.1 STEP in PROGRAM:
This approach is composed of two programs mainly:
1. Hiding program, which is responsible for hiding data in text means program of converting data.
2. Extractor program which extracts data from the stegno text (text containing hidden data).
3.2.1.1 In Hiding program:
Firstly enter the secret message which we want to hide.
Enter the name of the file as a cover text in which we want to hide our secret message.
Generate a coverd text file as a stego-text in which our secret message is hidden.
Figure10: Hiding of Secret message
3.2.1.2 In Unhiding program:
Firstly enter the name of the text file (stego-text) which generate after the hiding of the secret message.
Extract the secret message.
Figure11: Unhiding the secret message
6. “A Novel Approach of Text Steganography based on null spaces”
www.iosrjournals.org 16 | Page
IV. Experimental Result:
In this approch, hiding information within spaces seems to be potential as people hardly can know
about the existence of the hidden bits. This thesis shows that one space is interpreted as “0” whereas two spaces
are interpreted as “1”. This embedding scheme was applied in the space which appears between the words.
4.1 Output of Hide program:
4.2 Output of Unhide program:
The major drawback of this method is that it requires a great deal of space to encode few bits. For
example, a character is equivalent of 8 bits, and it requires approximately 8 inter-spaces to encode one character.
The challenges concerned with hiding data in text files include:
i. Low storing capacity of text in cover message in text steganography.
ii. Inserting additional spaces to represent information results in an increase in stego-cover object size.
iii. It can store the secret message only in the text file.
iv. Changing a single bit of a byte results in an all together different ACII code that may/may not have any
relevancy with the text contents.
V. Conclusion and Future work:
Text Steganography is one of the most difficult methods because a text file is not a proper media to
hide data in it. In this there are a lot of shortcoming in the form of low storing capacity of the cover message and
the useless increasing size of the cover message with the use of null spaces. So we need to resolve these
problems for making text steganography more effective.
Improve weakness of the system:
* Low storing capacity of text in cover message in text steganography.
* Inserting additional spaces to represent information results in an increase in stego-cover object size.
* Some text editor programs automatically delete extra white-spaces and thus destroy the hidden information.
Hide any kind of information, not only text file.
In future we can make this more effective by adding some extra feature. In future we will use indexing
feature for storing the same letters used in secret message for reducing the low storing capacity of words and
reducing the size of the cover message by the limited use of the null spaces in cover message and the scope of
the project can be extended by turning the software into a web application and it can be extended by adding an
e-mailing feature to the software where the encoded stream can be mailed to the receiver to get it decoded. This
feature can make the software really efficient.