Downloads: 148 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | Ethiopia | Volume 7 Issue 3, March 2018
A Comparison of Different Approaches in Text Steganography
Abstract: The important of reducing a chance of the information being detected during the transmission is being an issue now days in the digital age, Steganography is the art and science of data hiding the existence of the communication by concealing a secret message inside another unsuspicious message. Steganography is often being used together with cryptography and offers an acceptable amount of privacy and security over the communication channel. This paper presents an overview of text and a brief history of steganography along with various existing text-based steganography techniques. Highlighting some of the problems inherent in text steganography as well as issues with existing solutions. The first approach hides a message in a wordlist where ASCII value of embedded character determines length and starting letter of a word. The second approach conceals a message, without degrading cover, by using start and end letter of words of the cover. The third approach is proposed in information hiding using inter-word spacing and inter-paragraph spacing as a hybrid method. Our method offers dynamic generated stego-text with six options of maximum capacity according to the length of the secret message. This paper also analyzed the significant drawbacks of each existing method and how our new approach could be recommended as a solution.
Keywords: Information hiding, steganography, text steganography
Edition: Volume 7 Issue 3, March 2018,
Pages: 179 - 182
Similar Articles with Keyword 'Information hiding'
Downloads: 108
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3119 - 3124Steganography & Cryptography for Regimented Data Hiding System: A Review
Akash Sharma [10] | Nikita Jain [2]
Downloads: 108
Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1548 - 1550Joint Task Migration and Power Management in Wireless Computing
Dayanand G Savakar [9] | Anand S Ghuli [2]