On using Emoticons and Lingoes for Hiding Data in SMS

Size: px
Start display at page:

Download "On using Emoticons and Lingoes for Hiding Data in SMS"

Transcription

1 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), August 25-27, 2015, Langkawi, Kedah, Malaysia On using Emoticons and Lingoes for Hiding Data in SMS Vahab Iranmanesh* 1, Ho Jing Wei 1, Sean Lee Dao-Ming 1, Olasimbo Ayodeji Arigbabu 1 Department of Computing and Information Systems Faculty of Science and Technology Sunway University Bandar Sunway, Selangor, Malaysia *vahab.iranmanesh@gmail.com, { , }@imail.sunway.eud.my, oa.arigbabu@gmail.com Abstract SMS is widely used as a daily communication service among people around the world. As such, SMS is a suitable means that can be readily exploited for transferring secret messages between individuals in a less conspicuous way. In this paper, we present an investigation on the suitability of hiding secret message in SMS. The hidden data are represented as lingoes and emoticons which are frequently used by users in SMS and chat. As a result, a pre-shared list, which is common between the sender and receiver is used to embed, and later extract the secret message in SMS in a natural form. The proposed method is implemented and tested on Android based mobile device, and showed some desirable outcomes. Keywords - Data hiding; SMS steganography, Emoticons; lingoes I. INTRODUCTION Ever since the invention of the first mobile phone in 1973, mobile phone has become a universal means of communication among individuals, and it is one of the most utilized technologies on a daily basis. In fact, almost every individual around the globe owns at least one mobile phone. Over the years, mobile phones have evolved from being just an accessory, to becoming a necessity in most people s lives. Probably one of the easiest and most widely used methods of communication present in mobile phones is a short message service (SMS). By definition, SMS is the transfer and exchange of short text messages using 160 characters [1] between two mobile phones. It has a short time of transferring messages and also low cost [2]. However, one of the main issues with the use of mobile phones is the security and privacy of the information, since it is not a wired communication. Mobile phone spying is a well known crime and interception or recording of messages between two mobile phones is one of these methods commonly used [3]. Another example is phone cloning that also allows an attacker to intercept incoming messages and send outgoing messages as though the phone is the original one [4]. Due to the susceptibility of mobile phones to these kinds of intrusions, several solutions such as cryptography and steganography are needed to ensure information is not trivially compromised. Steganography is a method used for hiding data within other data, and has gained prominence in recent years. In steganography, the main goal is to hide data within a cover media, such that, only the sender and receiver can understand the hidden information. The cover medium refers to the media in which the data are embedded and can be in the form of text, images, or audio files [5]. Moreover, one of the main benefits of using steganography over cryptography is that, cryptography is obvious to the observers that there is a hidden message, whereas in steganography, the secret message is hidden in the cover media, to make it look inconspicuous and only the receiver would have the right key to extract the secret message [6]. As a matter of fact, text is the most difficult media due to less redundant information in the file [7]. Any changes in the media will affect the structure of text and eventually lead to retrieval of the secret message. II. RELATED WORKS Unlike other steganography approaches, studies on data hiding in short message service (SMS) are quite limited. The first investigation on SMS steganography was reported by Shirali-Shahreza [8], which utilized image as cover media and SMS as carrier to transfer the hidden message to the recipient. In this method, a black and white (B&W) image is used to transfer the hidden message by changing the intensity of pixels. However, low capacity (27 bytes) is the main drawback of the mentioned technique, due to the use of only black and white image rather than using full colour. The study presented in [9] exploited abbreviation or full form of words such as "u" for the meaning of "you", and "univ" for "university" to hide the secret message in the SMS. For example, to hide 01, the abbreviation form of the word (u) is used to embed value 0, whereas the full form (you) is utilized for embedding value 1. The main limitation of this method is very low payload capacity and easy extraction. Further, the static form of the word abbreviation list is removed by introducing computationally light weighted exclusive or (xor) encryption in [10]. The method has the capability to swap the abbreviation and full form words in the statistic table in conjunction to the stego key as an additional /15/$ IEEE 103

2 security layer, which makes the data difficult to retrieve by an attacker. In [11], the image is used to hide software activation code based on the steganography technique proposed in [8] and then send the image to the recipient through SMS. The new method didn't show any significant improvements to their previous method rather sending activation code. The use of Sudoku game is another interesting technique proposed by Shirali-Shahreza [12], where the recipient receives an unsolved Sudoku puzzle to solve in order to retrieve the hidden data from the puzzle. In this case, the arrangement of numbers from 1 to 9 on the puzzle is exploited as features to embed the secret message, and later, two key values as the location of embedding row and column are also sent to the receiver along with the SMS to extract the hidden data. Since the embedding locations can only be 2 places (2 cells) in Sudoku puzzle with 9 bits per cell, it can embed very short messages such as 18 bits (9 bits per cell). As it is suggested by the same author, expanding Sudoku puzzles in bigger size such as instead of 9 9 cells, the more secret message can be embedded. Using Least Significant Bit (LSB) for hiding data on the colour image for the bank customers is introduced in [13]. Since human eyes cannot distinguish the slight changes in blue colour, two bit value of blue pixel is used for coding one byte of data. Moreover, the customers of banks are required to use a particular mobile banking application to receive SMS for downloading the image file that contains hidden data from the bank website. Then, the decoder goes through the downloaded image to extract the hidden data based on LSB method. For having additional security, a password function is developed before reading the image file in mobile application. However, the main limitation of the mentioned technique is using the LSB method in time domain which can be altered through channels such as filtering. However, high payload capacity is an advantage of the this technique, since several pixels within the colour image are used for hiding the data. Bhaya [14] proposed using proportional fonts to hide sensitive data which cannot be easily recognized by human eyes. In this case, the hidden data are converted to a string of 1s and 0s. Then these binary values are represented by proportional font with one bit encoding in one character. Low payload capacity is the limitation of this technique, as one character is used to embed one bit of hidden data. The application of frequently used emoticons has been recently introduced as cover media [15]. To achieve this, a pre-shared list is specified to map several emoticons to the alphanumeric characters. For example, :-) refers to character A and :-( to character B, and so on. High capacity is one of the advantages of this technique due to the use of one character to replace with one character of hidden data. The emoticons are not only used in SMS steganography, but also used in chat to hide the data. An example of such approach is presented in [16], whereby emoticons are categorized into several classes based on the feelings expressed by each emoticon such as cry and happy classes. Then in each class, emoticons are ordered and located at different locations to embed end extract the secret message. For instance, to embed the bit string like 1110 which is equivalent to 14 in decimal format, a category is selected which has emoticon at location 14. Thus, emoticon 14 from that particular category is selected and sent to the recipient. To extract the hidden data, the same emoticon categories are used with respect to the location of the sent emoticon which is located in 14 and then the binary value (1110) is extracted. However, in this method, to embed higher values such as 65 ( ), we need to use more than one emoticons (two emoticons) due to limitation on the number of emoticons in each category. Despite the numerous techniques that have been proposed, no work to the best of our knowledge has suggested lingoes as feelings expression, which is generally accepted and used in SMS and chat environment, in order to hide the secret message. The aim of this research is to study on how lingoes in conjunction with the other feelings expression such as emoticons can be used to embed and extract the hidden data in a natural way within the SMS between two parties. The result shows that the current method can embed the secret message within the SMS naturally without raising the attention of eavesdropper. The rest of the paper is organized as follows: Section III describes the proposed method. Section IV draws the discussion and conclusion. III. PROPOSED METHOD The illustration of the proposed method for SMS steganography is depicted in fig 1, which is also utilized similar architecture as those described in [15,16]. In this approach, the emoticons and lingoes (abbreviation of words) that are frequently typed in chat and SMS, are used as cover media to deliver the data in a hidden manner. The recipient is able to decode the data based on the meaning of emoticons and lingoes in the pre-shared list. The encoding is based on one character per emoticon or lingo. Fig. 1. Proposed method The emoticon is a sort of icons that depicts a user s feeling in text mode as shown in fig 2. These icons are widely used, especially in SMS and chat where there is a limitation on the number of characters. Also, abbreviations are also used as lingo to transfer the meaning with less number of characters such as "gr8" for great. 104

3 (160 characters) and cannot be fitted within one SMS, the rest of the secret message can be transferred to the second SMS and so on. Finally, the stego text is passed to the recipient through SMS. Fig. 2. Several SMS emoticons A. Embedding The first step in the proposed technique involves suggesting a pre-shared list that contains lingoes and emoticons along with their alphanumeric meanings, as shown in Table I. This list is commonly shared between the sender and recipient to encode and decode the secret message in the SMS. This pre-shared list is developed as an application in the Android operating system for embedding and extracting purpose. In the next step, the sender needs to embed the secret message within several steps. Figure 3 shows the main windows of the application that contains embedding and extraction parts developed using Java programming language. The user is required to select the embedding function first, since the interest is on in concealing the data. Then, as shown in fig 4, the application requests for the secret message, (for example "attack"), to be transmitted to the recipient. Further, by using Table 1, the secret message characters (attack) can be converted to their respective characters such as " ;) tbh tbh ;) -.- plox " which is shown in fig 5. Therefore, this conversion method is used as a pre-share list (key) which is exchanged through a different channel rather than SMS in order to embed and extract the secret message. In addition, each derived lingo and emoticon can be placed anywhere within the cover text (beginning, middle or at the end of each sentence or even a word) depending on the meaning of the sentence or word preceding or succeeding the lingo or emoticon. Then, the user is required to type a cover text in conjunction with the generated lingoes and emoticons as shown in fig 5. Since the emoticons and lingoes are used for hiding the data which represents human feelings, we would like to emphasize that selection of cover text should be done based on the feelings that are related to the generated lingoes and emoticons. This is important to make the stego text appear as normal as possible to the eavesdropper. For example, ;) is the first generated character which is one of the emoticons, meaning wink. In this case, the sender must pay attention to this, to type a sentence with a non-contradicting feelings to the mentioned emoticon such as angry. Similarly, it will be preferable for the remaining cover text sentences be equivalent to the corresponding generated lingoes and emoticons. In rare cases, if the length of secret message is longer than normal Fig. 3. Main window of SMS steganography application TABLE I. PRE-SHARED LIST Alphanumeric Lingoes and emoticons a ;) b ;( c -.- d =) e =( f :) g :( h =/ i =\ j QAQ K plox l =.= m ToT n == o._. p xd q OTL r afk s brb t tbh u tldr v lmao w wew X ttyl y wp z iirc 1 gg 2 :] 3 :[ 4 ikr 5 rofl 6 >.< 7 asap 8 -_- 9 =] 0 =[ 105

4 Fig. 4. Entering secret message window Fig. 6. Extracting windoww Fig. 5. Embedding window Fig. 7. Extracted secret message B. Extracting Similarly, in the recipient side, the user is required to use the same mobile application to extract the secret message from the SMS. To this end, the mobile application uses the same pre-shared list to extract the secret message from the stego SMS. Since the words are not important in stego SMS, the mobile application searches through entire SMS in order to extract the emoticons and lingoes. Later on, these emoticons and lingoes are represented the secret message characters using Table 1 as shown in fig 6 and 7. For example, the first character, apart from words, is " ;) " which is converted to the character " a ". In the same way, the rest of other emoticons and lingoes of receiving SMS can be converted in the same way using Table 1 to complete the secret message (attack). IV. DISCUSSION AND CONCLUSION This paper suggested a method for hiding data using lingoes and emoticons in SMS. Based on the fact that, mobile phone is now a widely used mode of communication by the larger population, the described method is usable anywhere and at any time, withoutt being conspicuous to an eavesdropper. Hiding data in SMS can be performed using different approaches. Several researchers have used image to hide secret messages [8,11,13]. The main advantage of this method is high capacity due to using pixel intensity to embed the secret message. However, any modification of the image during the transition, such as filtering, can affect on the result. Also, use of word abbreviations and full form have been attempted to represent the secret message in SMS [9,10]. Since the embedding is based on bits, several abbreviated forms of the words are required to transmit the hidden data. In this case, it would raise the attention of the attacker to the existence of secret message in the SMS. Due to SMS being used a mutual communication between sender and receiver, in [12], Sudoku puzzle is used to embed the secret message within locations of puzzle cells. In another approach, human feelings are represented as emoticons in SMS and chat [15,16] to transfer the secret message. Moreover, using only 106

5 emoticons to express users feelings continuously in SMS would generate a pattern to identify the existence of hidden message. However, delivering more data is the principal advantage of this method due to the need of representing one character of secret message with one emoticon in the SMS. However, in this study, lingoes are suggested as additional feelings apart from emoticons to make the cover media becomes more realistic rather than using only word and emoticons. In other words, the stego media (SMS) is a combination of word, emoticons and lingoes which is very similar to its natural form as shown in fig 6. Since lingoes introduce the chance to express more feelings on SMS, a user has more flexibility to select proper sentences to deliver the secret message by his feelings, based on emoticons and lingoes. Although the proposed is quite simplistic, it works quite effectively based on the experiments we have conducted. Nevertheless, we would like to point out the limitations of this work. The first one is that, some lingoes with more than one character such as "plox" occupy several characters of cover media, which results in embedding smaller hidden data due to the limitation of characters per SMS (160 characters). The second is using fixed pre-shared list (key) which can be disclosed or guessed by the attacker in order to extract the secret. In future works, the suggested method can be expanded to dual steganography, which takes encryption into account by encoding (cryptography) secret message before embedding for better security. In addition, the pre-shared list containing the alphanumeric characters can be shuffled from time to time to generate a new private key, to be used between the sender and receiver, during embedding and extraction of hidden data. This creates some difficulties for the eavesdropper to understand the secret message. REFERENCES [1] Digital cellular telecommunications system, Global System for Mobile communications (GSM) ETSI TS , GSM version 7.4.0, [2] Technical realization of the Short Message Service (SMS) ETSI, [3] M. Kashif, " Secure SMS communication using encryption gateway and digital signature ", International Conference on Computational Science and Engineering (CSE), pp , [4] J. Singh, R. Ruhl, and D. Lindskog, " Secure GSM OTA SIM cloning attack and cloning resistance in EAP- SIM and USIM ", International Conference on Social Computing (SocialCom), pp , [5] S. Bhattacharyaa, I. Banerjee, and G. Sanyal, "A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier", Journal of global research in computer science, 2(4), [6] I. V. S. Manjo, "Cryptography and steganography", International journal of computer applications, 1(12), [7] M. Agarwal, "Text steganography approaches: a comparison", International journal of network security and its application, 5(1), [8] M. Shirali-Shahreza, "Stealth steganography in SMS", Proceedings of the third IEEE and IFIP International conference on wireless and optical communications networks (WOCN), April, [9] M. Shirali-Shahreza, and M. H. Shirali-Shahreza, " Text steganography in SMS", International conference on convergence information technology, pp , [10] K. F. Rafat, "Enhanced text steganography in SMS", International conference on computer, control and communication, pp. 1-6, [11] M. H. Shirali-Shahreza, and M. Shirali-Shahreza, "Sending mobile software activation code by SMS using steganography", Third international conference on intelligent information hiding and multimedia signal processing, 1, pp , [12] M. H. Shirali-Shahreza, and M. Shirali-Shahreza, "Steganography in SMS by Sudoku puzzle", International conference on computer systems and applications, pp , [13] M. Shirali-Shahreza, "Improving mobile banking security using steganography", Fourth international conference on information technology, pp , [14] W. S. Bhaya, "Text hiding in mobile phone simple message service using fonts", Journal of computer science,7 (11), pp , [15] W. S. Bhaya, "A new approach to SMS text steganography using emoticons", International journal of computer applications, [16] W. Zhi-Hui, C. Chin-Chen, D. K. The, and L. Ming-Chu, "Emoticonbased text steganography in chat", Asia-Pacific conference computational intelligence and industrial applications, 2, pp ,

A New Approach to SMS Steganography using Mathematical Equations

A New Approach to SMS Steganography using Mathematical Equations A New Approach to SMS Steganography using Mathematical Equations Min Yang Lee, Vahab Iranmanesh *, Juan C. Quiroz Faculty of Science and Technology Sunway University Bandar Sunway, Malaysia 12050431@imail.sunway.edu.my,

More information

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of

More information

Efficient & Secure Data Hiding Using Secret Reference Matrix

Efficient & Secure Data Hiding Using Secret Reference Matrix Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3

More information

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 2 Abstract Steganography derives from a Greek word and means covered writing. It is a sector of computer information security. Cryptography

More information

Steganography using MATLAB

Steganography using MATLAB ABHIYANTRIKI Steganography using MATLAB An International Journal of Engineering & Technology (A Peer Reviewed & Indexed Journal) Vol. 3, No. 5 (May, 2016) http://www.aijet.in/ eissn: 2394-627X Srikant

More information

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security International Journal of Computational Engineering & Management, Vol. 15 Issue 3, May 2012 www..org 1 A Data Hiding Model for Image Steganography Using Primes: Towards Data Security Mamatha.T Assistant

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

LSB Based Audio Steganography Using Pattern Matching

LSB Based Audio Steganography Using Pattern Matching ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom

More information

A Review of Approaches for Steganography

A Review of Approaches for Steganography International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2

More information

A Performance of Embedding Process for Text Steganography Method

A Performance of Embedding Process for Text Steganography Method A Performance of Embedding Process for Text Steganography Method BAHARUDIN OSMAN 1, ROSHIDI DIN 1, TUAN ZALIZAM TUAN MUDA 2, MOHD. NIZAM OMAR 1, School of Computing 1, School of Multimedia Technology and

More information

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT

More information

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH

More information

STEGANOGRAPHY USING 2LSB PARITY CHECK AND BPCS TECHNIQUES

STEGANOGRAPHY USING 2LSB PARITY CHECK AND BPCS TECHNIQUES STEGANOGRAPHY USING 2LSB PARITY CHECK AND BPCS TECHNIQUES Prof. Dipti Dighe 1, Swati Dubey 2, Prof. Shubhangi Takawane 3 1,2,3 Electronics and telecommunication Engineering Department, G.S. Moze College

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

Steganalysis of Hydan

Steganalysis of Hydan Steganalysis of Hydan Jorge Blasco 1, Julio C. Hernandez-Castro 1, Juan M.E. Tapiador 1 Arturo Ribagorda 1 and Miguel A. Orellana-Quiros 2 1 {jbalis, jcesar, jestevez, arturo}@inf.uc3m.es 2 mangel.orellana@meh.es

More information

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt

More information

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By- Steganography Using Prime Technique Authors Vinam Tomar Guided By- Kamal Saluja Ganga Technical Campus, Soldha Email-vinamtomar@gmail.com Abstract Steganography is the art and science of communicating

More information

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)

More information

AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE

AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE 1 SITI DHALILA MOHD SATAR, 1 NAZIRAH ABD HAMID, 1 FATIMAH GHAZALI, 1 ROSLINDA MUDA, 1 MOHAMAD AFENDEE MOHAMED 1 Faculty of Informatics and Computing,

More information

Fast Real-Time Hardware Engine for Multipoint Text Steganography

Fast Real-Time Hardware Engine for Multipoint Text Steganography Fast Real-Time Hardware Engine for Multipoint Text Steganography Ammar Odeh, Khaled Elleithy, and Miad Faezipour Dept. of Computer Science and Engineering University Of Bridgeport Bridgeport, CT 06604,

More information

Novel Content Independent Steganographic Method for Microsoft Office

Novel Content Independent Steganographic Method for Microsoft Office Vol. 9/ No. 2 (2017) INTERNETWORKING INDONESIA JOURNAL 17 Novel Content Independent Steganographic Method for Microsoft Office Saqib Ishtiaq, Aihab Khan and Basheer Ahmad Samim Abstract Microsoft Office

More information

CREATING AN IMAGE USING ENCRYPTED SENSITIVE WORDS

CREATING AN IMAGE USING ENCRYPTED SENSITIVE WORDS CREATING AN IMAGE USING ENCRYPTED SENSITIVE WORDS Reshmi.R.V Student, Dept. of Information Technology, CSI College Of Engineering, India ABSTRACT--Data hiding is one of the most better data and communication

More information

MULTILAYER DATA HIDING USING SLS COMBINED WITH LSB TECHNIQUE FOR IMAGE CRYPTO- STEGANOGRAPHY

MULTILAYER DATA HIDING USING SLS COMBINED WITH LSB TECHNIQUE FOR IMAGE CRYPTO- STEGANOGRAPHY MULTILAYER DATA HIDING USING SLS COMBINED WITH LSB TECHNIQUE FOR IMAGE CRYPTO- STEGANOGRAPHY Mr. Abhale Babasaheb A 1, Ms. Jyoti Bhagwat 2, Ms. Priyanka Dopare 3 1,2,3 SND COE & RC,Savitribai Phule Pune

More information

Architectural Design of Multi Level Steganography System for Data Transmission

Architectural Design of Multi Level Steganography System for Data Transmission Architectural Design of Multi Level Steganography System for Data Transmission Adedayo Adeolu Adeniji, Micheal Esiefarienrhe, and Naison Gasale Abstract Recent advances in steganography systems have shown

More information

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image 015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics

More information

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information

More information

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography

More information

A Hybrid Method of Hiding The Text Information Using Stegnography

A Hybrid Method of Hiding The Text Information Using Stegnography A Hybrid Method of Hiding The Text Information Using Stegnography M.Grace Vennice, M.Swapna, MD.Ahmad Ali & T.Dharma Reddy CSE Dept, CMRCET, Hyderabad, India. E-mail : grace_vennice@yahoo.co.in, swapna_manthena2007@yahoo.com

More information

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,

More information

Steganalysis of Hydan

Steganalysis of Hydan Steganalysis of Hydan Jorge Blasco, Julio C. Hernandez-Castro, Juan M.E. Tapiador, Arturo Ribagorda and Miguel A. Orellana-Quiros Abstract Hydan is a steganographic tool which can be used to hide any kind

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING ABSTRACT: Video data hiding is still an important research topic due to the design complexities involved. We propose a

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

Challenges of Hidden Data in the Unused Area Two within Executable Files

Challenges of Hidden Data in the Unused Area Two within Executable Files Journal of Computer Science 5 (11): 890-897, 2009 ISSN 1549-3636 2009 Science Publications Challenges of Hidden Data in the Unused Area Two within Executable Files A.W. Naji, A.A. Zaidan and B.B. Zaidan

More information

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,

More information

Pixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm

Pixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm Pixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm Prabhu Kumar 1,, Nikhil Tirpathi, 2, G.Michael 3 UG Student, Dept. of CSE, Bharath University, Chennai, India 1,2 Assistant

More information

PAYLOAD CAPACITY ENHANCEMENT IN THE FIELD OF STEGANOGRAPHY BY USING MOBILE APPLICATION BASED STEGO TECHNIQUE

PAYLOAD CAPACITY ENHANCEMENT IN THE FIELD OF STEGANOGRAPHY BY USING MOBILE APPLICATION BASED STEGO TECHNIQUE PAYLOAD CAPACITY ENHANCEMENT IN THE FIELD OF STEGANOGRAPHY BY USING MOBILE APPLICATION BASED STEGO TECHNIQUE By CHANDRAKANT BADGAIYAN Assistant Professor, Department of Mechatronics Engineering, C.S.I.T.

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. Strong Encryption Key with Enhanced Security of image Steganography by Modulus operator Method TARUN DHAR DIWAN 1, SOMYA YASH 2 1 Dr.C.V.RAMAN UNIVERSITY, BILASPUR, INDIA ASSISTANT PROFESSOR DEPTT.OF ENGINEERING

More information

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in

More information

HTML Steganography using Relative links & Multi web-page Embedment

HTML Steganography using Relative links & Multi web-page Embedment HTML Steganography using Relative links & Multi web-page Embedment 1 Chintan Dhanani, 2 Krunal Panchal 1 Mtech Scholar, 2 Lecturer Department of computer engineering, Gujarat Technological University,

More information

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers Introduction to steganography org.steganography library principles Hide & Reveal screenshots 14/05/2010 Steganography made

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

Secret Sharing in Audio Steganography

Secret Sharing in Audio Steganography Secret Sharing in Audio Steganography Ka Fai Peter Chan Defence, Peace, Safety & Security (DPSS) Council for Scientific and Industrial Research Pretoria, South Africa kchan@csir.co.za Abstract This paper

More information

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation

More information

Analysis of Steganography as a Security Technique

Analysis of Steganography as a Security Technique Analysis of Steganography as a Security Technique Anirudh Sohil Department of Information Technology BVCOE, New Delhi Abstract: Application developers faces many challenges while creating an application

More information

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi

More information

Implementing Security in QR Codes by using Blowfish Algorithm

Implementing Security in QR Codes by using Blowfish Algorithm Implementing Security in QR Codes by using Blowfish Algorithm Harpreet Sandhu 2, Kamesh Dubey 2 1 (Dept of Computer Science, CT Institute of Technology & Research, Jalandhar, Punjab, India) 2 (Dept of

More information

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding) New Technique for Encoding the Secret to Enhance the Performance of Image Steganography Method (MPK Encoding) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al -

More information

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE 1 Naitik P Kamdar, 2 Dipesh G. Kamdar 3 Dharmesh N.khandhar. 1 (Student of Master of Engineering in Electronics & Communication,

More information

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program K. Jayamalini 1, Shashank Dubey 2, Ashish Singh 3, Geetesh Tiwari 4, Gaurav Singh 5

More information

II. LITERATURE SURVEY

II. LITERATURE SURVEY Secure Transaction By Using Wireless Password with Shuffling Keypad Shweta Jamkavale 1, Ashwini Kute 2, Rupali Pawar 3, Komal Jamkavale 4,Prashant Jawalkar 5 UG students 1,2,3,4, Guide 5, Department Of

More information

Distributed Steganography

Distributed Steganography Distributed Steganography Background Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text or an image is inserted into

More information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

A Stegnographic Method For Secure Communication And Access Control Using Web Service Container

A Stegnographic Method For Secure Communication And Access Control Using Web Service Container International Journal Of Scientific Research And Education Volume 2 Issue 11 Pages-2191-2197 November-2014 ISSN (e): 2321-7545 Website: http://ijsae.in A Stegnographic Method For Secure Communication And

More information

A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme

A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme G. Lakshmeeswari *, D. Rajya Lakshmi, Y. Srinivas, and G. Hima Bindu GIT, GITAM University, Visakhapatnam, Andhra Pradesh {lak_pr,rdavuluri}@yahoo.com,

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

Text Steganography Using Compression and Random Number Generators

Text Steganography Using Compression and Random Number Generators Text Steganography Using Compression and Random Number Generators Mohamed Y Elmahi Elimam Almahdi University Kosti, Sudan Talaat M.wahbi Sudan University of Science and Technology Khartoum, Sudan Mohamed

More information

Jeff Hinson CS525, Spring 2010

Jeff Hinson CS525, Spring 2010 DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction

More information

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

EFFICIENT METHOD FOR HIDING DATA BY PIXEL INTENSITY

EFFICIENT METHOD FOR HIDING DATA BY PIXEL INTENSITY EFFICIENT METHOD FOR HIDING DATA BY PIXEL INTENSITY M.Shobana # 1, R.Manikandan *2 #1 Department School of Computing, SASTRA University, Thanjavur,TamilNadu, India. *2 Senior Asst Prof, School of Computing,

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD

More information

Appendix A. Definition of Terms

Appendix A. Definition of Terms Appendix A Definition of Terms Artifact: Artifacts are the irregularities that may be present in an image after processing. They are not related to the details of the image and sometimes accompany transmitted

More information

PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME

PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME Volume 118 No. 18 2018, 2127-2132 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET

More information

IMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION

IMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION Int. J. Engg. Res. & Sci. & Tech. 24 Priyanka Agrawal and Vijay Kumar Sharma, 24 Research Paper ISSN 239-599 www.ijerst.com Vol. 3, No. 4, November 24 24 IJERST. All Rights Reserved IMPROVED ALGORITHM

More information

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method Sonal Varshney M.tech Scholar Galgotias University Abhinandan Singh M.tech Scholar Galgotias University Abstract With the rapid

More information

SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)

SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) Ayman Wazwaz 1, Khalil Abu-haltam 2, Sawan Atawneh 2, Areej Idaes 2, Dalal Salem 2 1 Electrical Engineering Department, Palestine Polytechnic

More information

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Journal Science ISSN: 39-7157, ISSN: 39-7157, 1 015 015 Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Shefali Rani1, Yogesh Kumar 1 (M.Tech

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

Overview Of Techniques Of Stegnography On Various Media

Overview Of Techniques Of Stegnography On Various Media Overview Of Techniques Of Stegnography On Various Media Ms. Arpana Chaturvedi,, Jagannath International Management School, Vasant Kunj, Email: pcord.bca@jagannath.org Ms.Poonam Verma, Jagannath International

More information

Nature Sunday Academy Lesson Plan

Nature Sunday Academy Lesson Plan Title Computer Security Description: Nature Sunday Academy Lesson Plan 2013-14 The objective of the lesson plan aims to help students to understand the general goals of security, the essential concerns

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon

More information

Sudipta Sahana Asst. Professor, Dept. of CSE JIS College of Engineering Kalyani, West Bengal, India

Sudipta Sahana Asst. Professor, Dept. of CSE JIS College of Engineering Kalyani, West Bengal, India Volume 4, Issue 10, October 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Size

More information

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012 Protocol Data Hiding By Chet Hosmer Article Posted: March 06, 2012 On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article

More information

A Novel Approach to Format Based Text Steganography

A Novel Approach to Format Based Text Steganography A Novel Approach to Format Based Text Steganography Sangita Roy School of Computer Engineering KIIT University Bhubaneswar, India rubyroy21.2005@gmail.com Manini Manasmita School of Computer Engineering

More information

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon Data Hiding in Binary Text Documents 1 Q. Mei, E. K. Wong, and N. Memon Department of Computer and Information Science Polytechnic University 5 Metrotech Center, Brooklyn, NY 11201 ABSTRACT With the proliferation

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

New Steganography Technique with Symmetric Cryptography

New Steganography Technique with Symmetric Cryptography 17 New Steganography Technique with Symmetric Cryptography Swati Gupta, PG Student, Department of CSE, SSSITS, Sehore, India Gajendra Singh, Head, Department of CSE &IT, SSSITS, Sehore, India Ravindra

More information

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia

More information

Text Steganography in SMS Using Similarity of Glyphs in Unicode Characters

Text Steganography in SMS Using Similarity of Glyphs in Unicode Characters Indian Journal of Science and Technology, Vol 8(29), DOI: 10.17485/ijst/2015/v8i29/84227, November 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Text Steganography in SMS Using Similarity of

More information

WLAN Security Overview

WLAN Security Overview WLAN Security Overview This Chapter Explore the basic terminology of WLAN security. Discuss the organizations that create the standards, certifications, and recommendations that help guide and direct wireless

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

Information and Communications Security: Encryption and Information Hiding

Information and Communications Security: Encryption and Information Hiding Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles

More information

Table of Contents. Starting a Thread. Replying to a Post. Searching for new threads/discussions and Posts. Reporting a Post

Table of Contents. Starting a Thread. Replying to a Post. Searching for new threads/discussions and Posts. Reporting a Post Table of Contents Starting a Thread Replying to a Post Searching for new threads/discussions and Posts Reporting a Post Uploading Media Files Like You Tube Uploading a Picture to a Post Quoting a Post

More information

Information Cloaking Technique with Tree Based Similarity

Information Cloaking Technique with Tree Based Similarity Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,

More information

CS 595: Cryptography Final Project

CS 595: Cryptography Final Project CS 595: Cryptography Final Project Tim Wylie December 7, 2009 Project Overview I have implemented a basic covert multi-party communication instant messaging program. The users can communicate with any

More information

Concealing Information in Images using Progressive Recovery

Concealing Information in Images using Progressive Recovery Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,

More information

Introducing Image Steganography in Bangla Language Communication

Introducing Image Steganography in Bangla Language Communication Introducing Image Steganography in Bangla Language Communication Sams Jarin Lecturer Department of CSE World University Bangladesh, Dhaka, Bangladesh Shah Mohazzem Hossain Captain, Bangladesh Army Instructor,

More information

DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS

DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS 1 Jiun-Tsung Wang ( 王竣聰 ) and 2 Wen-Hsiang Tsai ( 蔡文祥 ) 1 Institute of Multimedia Eng., National Chiao

More information

QR Code Watermarking Algorithm based on Wavelet Transform

QR Code Watermarking Algorithm based on Wavelet Transform 2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree

More information

CS1114 Assignment 5 Part 1

CS1114 Assignment 5 Part 1 CS1114 Assignment 5 Part 1 out: Friday, March 30, 2012. due: Friday, April 6, 2012, 9PM. This assignment covers two topics: upscaling pixel art and steganography. This document is organized into those

More information

A secure steganographic algorithm based on Cellular Automata using Fibonacci representation

A secure steganographic algorithm based on Cellular Automata using Fibonacci representation A secure steganographic algorithm based on Cellular Automata using Fibonacci representation Tuan Duc Nguyen Department of Computer Science Faculty of Science, Khon Kaen University Khon Kaen, Thailand nguyenductuan1982@gmail.com

More information