A Comparison of Different Approaches in Text Steganography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 148 | Views: 351 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | Ethiopia | Volume 7 Issue 3, March 2018 | Popularity: 6.9 / 10


     

A Comparison of Different Approaches in Text Steganography

Tewhasom Aregay Weldu


Abstract: The important of reducing a chance of the information being detected during the transmission is being an issue now days in the digital age, Steganography is the art and science of data hiding the existence of the communication by concealing a secret message inside another unsuspicious message. Steganography is often being used together with cryptography and offers an acceptable amount of privacy and security over the communication channel. This paper presents an overview of text and a brief history of steganography along with various existing text-based steganography techniques. Highlighting some of the problems inherent in text steganography as well as issues with existing solutions. The first approach hides a message in a wordlist where ASCII value of embedded character determines length and starting letter of a word. The second approach conceals a message, without degrading cover, by using start and end letter of words of the cover. The third approach is proposed in information hiding using inter-word spacing and inter-paragraph spacing as a hybrid method. Our method offers dynamic generated stego-text with six options of maximum capacity according to the length of the secret message. This paper also analyzed the significant drawbacks of each existing method and how our new approach could be recommended as a solution.


Keywords: Information hiding, steganography, text steganography


Edition: Volume 7 Issue 3, March 2018


Pages: 179 - 182



Please Disable the Pop-Up Blocker of Web Browser

Verification Code will appear in 2 Seconds ... Wait



Text copied to Clipboard!
Tewhasom Aregay Weldu, "A Comparison of Different Approaches in Text Steganography", International Journal of Science and Research (IJSR), Volume 7 Issue 3, March 2018, pp. 179-182, https://www.ijsr.net/getabstract.php?paperid=ART2018487, DOI: https://www.doi.org/10.21275/ART2018487

Top