1. The document presents a novel approach to text steganography that hides secret messages in null spaces of cover text documents.
2. The approach encodes secret message bits as extra null spaces inserted into the cover text plaintext, with one null space representing a 0 bit and two null spaces representing a 1 bit.
3. The encoding is done by a hiding program that generates a stego text file, while an extractor program can recover the secret message from the stego text. The approach aims to covertly communicate secret messages within innocuous-looking text.
A Novel Steganography Technique that Embeds Security along with CompressionCSCJournals
Problem faced by today’s communicators is not only security but also the speed of communication. This paper provides a mechanism that increases the speed of communication by reducing the size of content; for this data compression method is used and security factor is added by using Steganography. Firstly, the focus has been made on Data Compression and Steganography. Finally, proposed technique has been discussed. In Proposed technique first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter on compressed data state table operation is applied to improve the security. Then, this is used as the input to the LSB technique of Steganography. At receiver end, firstly the LSB extraction technique is used, thereafter the state table operation in reverse form is applied and finally the original data is obtained. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISONIJNSA Journal
This paper presents three novel approaches of text steganography. The first approach uses the theme of
missing letter puzzle where each character of message is hidden by missing one or more letters in a word
of cover. The average Jaro score was found to be 0.95 indicating closer similarity between cover and
stego file. The second approach hides a message in a wordlist where ASCII value of embedded character
determines length and starting letter of a word. The third approach conceals a message, without
degrading cover, by using start and end letter of words of the cover. For enhancing the security of secret
message, the message is scrambled using one-time pad scheme before being concealed and cipher text is
then concealed in cover. We also present an empirical comparison of the proposed approaches with some
of the popular text steganographic approaches and show that our approaches outperform the existing
approaches.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Novel Steganography Technique that Embeds Security along with CompressionCSCJournals
Problem faced by today’s communicators is not only security but also the speed of communication. This paper provides a mechanism that increases the speed of communication by reducing the size of content; for this data compression method is used and security factor is added by using Steganography. Firstly, the focus has been made on Data Compression and Steganography. Finally, proposed technique has been discussed. In Proposed technique first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter on compressed data state table operation is applied to improve the security. Then, this is used as the input to the LSB technique of Steganography. At receiver end, firstly the LSB extraction technique is used, thereafter the state table operation in reverse form is applied and finally the original data is obtained. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISONIJNSA Journal
This paper presents three novel approaches of text steganography. The first approach uses the theme of
missing letter puzzle where each character of message is hidden by missing one or more letters in a word
of cover. The average Jaro score was found to be 0.95 indicating closer similarity between cover and
stego file. The second approach hides a message in a wordlist where ASCII value of embedded character
determines length and starting letter of a word. The third approach conceals a message, without
degrading cover, by using start and end letter of words of the cover. For enhancing the security of secret
message, the message is scrambled using one-time pad scheme before being concealed and cipher text is
then concealed in cover. We also present an empirical comparison of the proposed approaches with some
of the popular text steganographic approaches and show that our approaches outperform the existing
approaches.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The word steganography has Greek origins and means ‘concealed writing.’
The original practice can be traced back to around 440 BC when the ancient Greeks hid messages within wax tablets by writing messages on the wood before applying a wax surface (Herodotus 1987).
Another early recorded use of steganography occurred in ancient Greece when messengers tattooed messages on their shaved heads and concealed the messages with the hair that grew over them afterwards, a technique also used by German spies in the early 20th century (Newman 1940).
EXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHYIJNSA Journal
As is commonly known, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders to protect the data from the prying eyes. However, using text as the target medium is relatively difficult as compared to the other target media, because of the lack of available redundant information in a text file. In this paper, in the backdrop of the limitations in the prevalent text based steganographic approaches, we propose simple, yet novel approaches that overcome the same. Our approaches are based on combining the random character sequence and feature coding methods to hide a character. We also analytically evaluate the approaches based on metrics viz. hiding strength, time overhead and memory overhead entailed. As compared to other methods, we believe the approaches proposed impart increased randomness and thus aid higher security at lower overhead.
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
A PPT on Stegnography,
It describes the security of information via images by encrypting and decrypting it with the document.
Uses of different models and diagrams.
The word steganography has Greek origins and means ‘concealed writing.’
The original practice can be traced back to around 440 BC when the ancient Greeks hid messages within wax tablets by writing messages on the wood before applying a wax surface (Herodotus 1987).
Another early recorded use of steganography occurred in ancient Greece when messengers tattooed messages on their shaved heads and concealed the messages with the hair that grew over them afterwards, a technique also used by German spies in the early 20th century (Newman 1940).
EXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHYIJNSA Journal
As is commonly known, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders to protect the data from the prying eyes. However, using text as the target medium is relatively difficult as compared to the other target media, because of the lack of available redundant information in a text file. In this paper, in the backdrop of the limitations in the prevalent text based steganographic approaches, we propose simple, yet novel approaches that overcome the same. Our approaches are based on combining the random character sequence and feature coding methods to hide a character. We also analytically evaluate the approaches based on metrics viz. hiding strength, time overhead and memory overhead entailed. As compared to other methods, we believe the approaches proposed impart increased randomness and thus aid higher security at lower overhead.
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
A PPT on Stegnography,
It describes the security of information via images by encrypting and decrypting it with the document.
Uses of different models and diagrams.
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a ciphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
Traid-bit embedding process on Arabic text steganography methodjournalBEEI
The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text. This paper present about traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.
TEXT STEGANOGRAPHIC APPROACHES: A COMPARISONIJNSA Journal
This paper presents three novel approaches of text steganography. The first approach uses the theme of missing letter puzzle where each character of message is hidden by missing one or more letters in a word of cover. The average Jaro score was found to be 0.95 indicating closer similarity between cover and stego file. The second approach hides a message in a wordlist where ASCII value of embedded character determines length and starting letter of a word. The third approach conceals a message, without degrading cover, by using start and end letter of words of the cover. For enhancing the security of secret message, the message is scrambled using one-time pad scheme before being concealed and cipher text is then concealed in cover. We also present an empirical comparison of the proposed approaches with some
of the popular text steganographic approaches and show that our approaches outperform the existing approaches.
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
Improving Hiding Security of Arabic Text Steganography by Hybrid AES Cryptogr...IJERA Editor
Steganography and cryptography are main tools for secure the information. The integration of steganography
with cryptography to secure communication, is an application that integrate Steganography techniques with
Cryptography techniques to get more secure communication method. This paper aim to design a system with
more sturdy security, by hybrid AES cryptography and text steganography. In this paper we proposed a method
that encrypt secret message and then embedding it in cover text. This done by scrambled secret message first
through AES encryption algorithm then hiding it into Arabic cover text. This paper also study the efficient
embedding technique that can be used for hiding the encrypted data in cover text to hide it from attackers and
sent message to the receiver in a safe mode.
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Full-RAG: A modern architecture for hyper-personalization
C0341117
1. IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 4 (July-Aug. 2012), PP 11-17
www.iosrjournals.org
“A Novel Approach of Text Steganography based on null spaces”
Prem Singh, Rajat Chaudhary and Ambika Agarwal
Department of Information Technology, DIT (Uttrakhand Technical University)
Abstract: Steganography is the art and science of covered or hidden writing. The purpose of steganography is
covert communication to hide the existence of a message from an intermediary. Digital Steganography
algorithms have been developed by using texts, images and audio etc as the cover media. In this approach, a
security model is proposed which imposes the concept of secrecy over privacy for text messages. In the recent
years, we have plenty of security tools which are developed to protect the transmission of multimedia objects.
But approaches for the security of text messages are comparatively less.
In this approach we present a new approach on text steganography through the null space in the cover
message for hiding the secret message. In this method, hiding bits of secret message is done through adding
extra null spaces in the plaintext of the cover file. These null spaces placed, when the binary bit of secret
message is equal to 1 in plaintext of the cover file. And null space remains unchanged when the binary bit of the
secret message is equal to 0.
Keywords: Steganography, cover message, secret message
I. Introduction:
Steganography is the art and science of writing hidden messages in such a way that no one, apart from
the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos
meaning "covered or protected", and graphein meaning "to write".
Steganography has been widely used, including in recent historical times and the present day. Some
possible known examples include: Hidden messages within wax tablets: in ancient Greece, people wrote
messages on the wood, and then covered it with wax upon which an innocent covering message was written.
Apparently neutral‟s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext
for embargo on by-products, ejecting suits and vegetable oils. By extracting the second letter from each word,
this hidden message can be decoded as:
Pershing sails from NY June 1. [1]
The development of new digital technologies has given an opportunity to improve message detection
that can pass more information and even be less conspicuous in transmission such as the microdots technology
developed by the Germans. Microdots uses microscopic shrink technique to hide pictures of text which can only
be read using a microscope. German spies used them in many different ways like messages hidden in letters, on
the face of watches and even on spotted ties.
The application of computer in real life is increasing day by day. So, the need to secure data is
becoming more and more essential part of message or data transfer. Information security became a part of our
daily life. Among the different techniques, hidden exchange of information is one of the concerns in the area of
information security. Various methods like Cryptography, steganography, coding and so on have been used for
this purpose. However, during recent years, steganography, perhaps has attracted more attention than others.
In implementing steganography, the main objective of Steganography is to hide the information under a
cover media so that the outsiders may not discover the information contained in the said media. This is the
major distinction between Steganography and other methods of hidden exchange of information. For example,
in cryptography method, people become aware of the existence of data by observing coded data, although they
are unable to comprehend the data. However, in Steganography, nobody notices the existence of data in the
resources.
Most Steganography works have been performed on images, video clips, text, music and sounds.
However text Steganography is the most difficult kind of Steganography; this is due to the lack of redundant
information in a text file, while there is a lot of redundancy in a picture or a sound file, which can be used in
Steganography. In this approach we presents a new approach on text steganography through the white/null space
in the cover message for hiding the secret message. In this method, hiding bits of secret message is done through
adding extra white/null spaces in the plaintext of the cover file. These white/null spaces placed, when the binary
bit of secret message is equal to 1 in plaintext of the cover file. And white/null space remains unchanged when
the binary bit of the secret message is equal to 0.
www.iosrjournals.org 11 | Page
2. “A Novel Approach of Text Steganography based on null spaces”
The structure of text documents is identical with what we observe, while in other types of documents
such as in a picture, the structure of document is different from what we observe. Therefore, in such documents,
we can hide information by introducing changes in the structure of the document without making a notable
change in the concerned output.
Text Steganography is one of the most difficult methods because a text file is not a proper media to
hide data in it. Among the most important of these technologies, one can name the hiding information in
electronic texts and documents (e-documents). The use of hiding information in text for web pages is another
example. Text steganography is the art or process of hiding one text into another text for the purpose of secure
communication so that the illegitimate user/ unauthorized user can‟t get the secret message for their own use.
II. Related work:
Before giving a brief description of the related work on Text Steganography, it will be appropriate to
discuss the frequent terms used in this context. The secret message to be hidden is referred to as embedded data
and the innocuous text / audio / image used for embedding is called as cover. The resultant output object after
embedding is referred to as stego-object. It is a priory for the sending and receiving ends to have agreed upon
on a mutual key exchange protocol / mechanism.
A few works have been done on hiding information in texts. Following is the list of different methods
of the works carried out and reported so far.
2.1 In general, the Text Steganography methods can be categorized into two groups:
1- Changing the text format.
2- Changing the meaning of the text.
The methods which are based on the changing the meaning of the text are limited. Some examples of
these methods are as follows:
2.1.1. Syntactic method :
By placing some punctuation marks such as full stop (.) and comma (,) in proper places, one can hide
information in a text file. This method requires identifying proper places for putting punctuation marks. The
amount of information to hide in this method is trivial.
2.1.2. Semantic method :
The authors Mohammad Sirali-Shahreza and M. Hassan Shirali-Shahreza in [8] have used synonym
words substitution for hiding secret message bits on the anology of 2.1-2.2.
This method uses the synonym of certain words thereby hiding information in the text. The synonym
substitution may represent a single or multiple bit combination for the secret information. A major advantage of
this method is the protection of information in case of retyping or using OCR programs. However, this method
may alter the meaning of the text.
Big Large
Small Little
Chilly Cool
Smart Clever
Spaced Stretched
TABLE 1 Semantic method
2.1.3. Text abbreviation or acronym :
Another method for hiding information is the use of abbreviations or acronym. Mohammad Sirali-
Shahreza and M.Hassan Shirali-Shahreza from Iran have suggested the use of substitution of words with their
respective abbreviations or viza viz in [6] to hide bits of secret message. Their suggested method operates as
follows:
Acronym Translation
(0) (1)
2l8 Too late
ASAP As Soon As Possible
C See
CM Call Me
F2F Face to face
TABLE 2 Text abbreviation or Acronym
www.iosrjournals.org 12 | Page
3. “A Novel Approach of Text Steganography based on null spaces”
Methodology: A table of two columns is organized with a preselected list of words and their
corresponding acronyms in such a way that the column under which words or its translation will
appear is labeled as „1‟ while that containing respective acronym is labeled as „0‟.The message/information
required to be hidden is converted into its equivalent binary (Table 2 refers for detail).
In this method, very little information can be hidden in the text. For example, only a few bits of
information can be hidden in a file of several kilobytes.In this method words can be substituted with their
abbreviations to represent the binary bit pattern of zero or one corresponding to the bits of secret information.
2.1.4. Change of spelling :
In his research paper [7] Mohammad Shirali-Shahreza presented a method to exploit same words which
are spelled differently in British and American English for hiding secret message bits. The concealment
methodology elaborated below, where the words spelled in British and American English are arranged in
separate columns; is identical to that explained in preceding sub-pera.
Methodology: The column labeled „1‟ contain words with British spellings while that containing same
words of American spelling is given a label „0‟.The secret message is converted into its equivalent binary. The
cover message is then iterated to find words that match to those available in pre-defined list. On finding a
matching word, the secret message bit is mapped to the column headings and the word at the cross-section of
that column and matched word‟s row is substituted in the cover message for the matched word.
Whole of the cover message is iterated to find matching words in the list followed by substitution of
word under column indicated by secret message bit. This method exploits the way words are spelled in British
and American English for hiding secret information bits.
American Spelling British Spelling
Favorite Favourite
Criticize Criticise
Fulfill Fulfil
Center Centre
TABLE 3: Change of Spelling
The methods which change the format of the text usually have a large capacity for hiding information. Some
examples of these methods are as follows:
2.1.5. Line shifting method :
In this method, the lines of the text are vertically shifted to some degree (for example, each line is
shifted 1/300 inch up or down) and information are hidden by creating a unique shape of the text. This method is
suitable for printed texts.
( Figure 4: Line Shifting)
However, in this method, the distances can be observed by using special instruments of distance
assessment and necessary changes can be introduced to destroy the hidden information. Also if the text is
retyped or if character recognition programs (OCR) are used, the hidden information would get destroyed. This
method hides information by shifting the text lines to some degree to represent binary bits of secret information.
2.1.6. Word shifting method :
In this method, by shifting words horizontally and by changing distance between words, information is
hidden in the text. This method is acceptable for texts where the distance between words is varying. This
method can be identified less, because change of distance between words to fill a line is quite common.
( Figure 5: Word Shifting)
But if somebody was aware of the algorithm of distances, he can compare the present text with the
algorithm and extract the hidden information by using the difference. The text image can be also closely studied
to identify the changed distances. Although this method is very time consuming, there is a high probability of
www.iosrjournals.org 13 | Page
4. “A Novel Approach of Text Steganography based on null spaces”
finding information hidden in the text. Retyping of the text or using OCR programs destroys the hidden
information.
2.1.7. Feature coding :
In feature coding method , some of the features of the text are altered. For example, the end part of
some characters such as h, d, b or so on, are elongated or shortened a little thereby hiding information in the
text. In this method, a large volume of information can be hidden in the text without making the reader aware of
the existence of such information in the text.
This method hides the secret information bits by associating certain attributes to the text characters. By placing
characters in a fixed shape, the information is lost. Retying the text or using OCR program destroys the hidden
information.
Some other methods are:
2.1.8. Miscellaneous techniques :
A large number of idiosyncrasies methods have been given by the authors in [9] that may be used for
hiding secret message bits inside a cover text e.g., by introducing modification or injecting deliberate
grammatical word/sentence errors with in text. Some of the suggested techniques / procedures given in this
context include:
(i) Typographical errors - “tehre” rather than “there”.
(ii) Using abbreviations / acronyms - “yr” for “your” / “TC” in place of “Take Care”.
(iii) Transliterations – “gr8” rather than “great”.
2.1.9. Steganography of information in specific characters in words :
In this method, some specific characters from certain words are selected as hiding place for
information. In the simplest form, for example, the first words of each paragraph are selected in a manner that
by placing the first characters of these words side by side, the hidden information is extracted. This has been
done by classic poets of Iran as well.
This method requires strong mental power and takes a lot of time. It also requires special text and not
all types of texts can be used in this method.
2.1.10. HTML tags :
HTML Tags can be used in varying combination or as gaps and horizontal tabulation to represent a
pattern of secret information bits. e.g.,
Stego key:
<img></img> -> 0
<img/> -> 1
Stego data:
<img src=g1.jpg></img>
<img src=g2.jpg/>
<img src=g3.jpg/>
<img src=g4.jpg/>
<img src=g5.jpg></img>
Hidden Bits: 01110
2.1.11. Hiding data by changing case of tag [12][13]:
As already stated, HTML Tags and associated members are case insensitive e.g., <html>, <HTML> or
<hTmL> will have the same impact on the document‟s outlook. Bits are hidden in TAGS by changing the case
of the alphabets based on the bit as either „0‟ or „1‟.
The draw back is that the changes are frequent and besides eye catching these can also be easily
decoded to extract the hidden information in the absence of any pre-agreed stego-key and usage
details.
III. Our approach:
3.1 Block Diagram of given Model:
Here we propose a new hybrid model using white/null space technique to hide the secret message in
text steganography.
www.iosrjournals.org 14 | Page
5. “A Novel Approach of Text Steganography based on null spaces”
Figure8: Broad level steps in Text Steganography
3.2 Working of the given model:
Hiding information within spaces seems to be potential as people hardly can know about the existence
of the hidden bits. This approach shows that one space is interpreted as “0” whereas two spaces are interpreted
as “1”. This embedding scheme was applied in the space which appears between the words. The major
drawback of this method is that it requires a great deal of space to encode few bits. For example, a character is
equivalent of 8 bits, and it requires approximately 8 inter-spaces to encode one character.
Figure9: How Stego-System works
In this approach we present a new approach on text steganography through the white/null space in the
cover message for hiding the secret message.
3.2.1 STEP in PROGRAM:
This approach is composed of two programs mainly:
1. Hiding program, which is responsible for hiding data in text means program of converting data.
2. Extractor program which extracts data from the stegno text (text containing hidden data).
3.2.1.1 In Hiding program:
Firstly enter the secret message which we want to hide.
Enter the name of the file as a cover text in which we want to hide our secret message.
Generate a coverd text file as a stego-text in which our secret message is hidden.
Figure10: Hiding of Secret message
3.2.1.2 In Unhiding program:
Firstly enter the name of the text file (stego-text) which generate after the hiding of the secret message.
Extract the secret message.
Figure11: Unhiding the secret message
www.iosrjournals.org 15 | Page
6. “A Novel Approach of Text Steganography based on null spaces”
IV. Experimental Result:
In this approch, hiding information within spaces seems to be potential as people hardly can know
about the existence of the hidden bits. This thesis shows that one space is interpreted as “0” whereas two spaces
are interpreted as “1”. This embedding scheme was applied in the space which appears between the words.
4.1 Output of Hide program:
4.2 Output of Unhide program:
The major drawback of this method is that it requires a great deal of space to encode few bits. For
example, a character is equivalent of 8 bits, and it requires approximately 8 inter-spaces to encode one character.
The challenges concerned with hiding data in text files include:
i. Low storing capacity of text in cover message in text steganography.
ii. Inserting additional spaces to represent information results in an increase in stego-cover object size.
iii. It can store the secret message only in the text file.
iv. Changing a single bit of a byte results in an all together different ACII code that may/may not have any
relevancy with the text contents.
V. Conclusion and Future work:
Text Steganography is one of the most difficult methods because a text file is not a proper media to
hide data in it. In this there are a lot of shortcoming in the form of low storing capacity of the cover message and
the useless increasing size of the cover message with the use of null spaces. So we need to resolve these
problems for making text steganography more effective.
Improve weakness of the system:
* Low storing capacity of text in cover message in text steganography.
* Inserting additional spaces to represent information results in an increase in stego-cover object size.
* Some text editor programs automatically delete extra white-spaces and thus destroy the hidden information.
Hide any kind of information, not only text file.
In future we can make this more effective by adding some extra feature. In future we will use indexing
feature for storing the same letters used in secret message for reducing the low storing capacity of words and
reducing the size of the cover message by the limited use of the null spaces in cover message and the scope of
the project can be extended by turning the software into a web application and it can be extended by adding an
e-mailing feature to the software where the encoded stream can be mailed to the receiver to get it decoded. This
feature can make the software really efficient.
www.iosrjournals.org 16 | Page