We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

New Text Steganography Technique by using Mixed-Case Font

by Abdelmgeid Amin Ali, Al–hussien Seddik Saad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 3
Year of Publication: 2013
Authors: Abdelmgeid Amin Ali, Al–hussien Seddik Saad
10.5120/10058-4650

Abdelmgeid Amin Ali, Al–hussien Seddik Saad . New Text Steganography Technique by using Mixed-Case Font. International Journal of Computer Applications. 62, 3 ( January 2013), 6-9. DOI=10.5120/10058-4650

@article{ 10.5120/10058-4650,
author = { Abdelmgeid Amin Ali, Al–hussien Seddik Saad },
title = { New Text Steganography Technique by using Mixed-Case Font },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 3 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number3/10058-4650/ },
doi = { 10.5120/10058-4650 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:10:40.372562+05:30
%A Abdelmgeid Amin Ali
%A Al–hussien Seddik Saad
%T New Text Steganography Technique by using Mixed-Case Font
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 3
%P 6-9
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the most important techniques of information hiding is a steganography. Steganography is the art of hiding information within other information or carriers (i. e. text, image, video or audio) in such a way that it is hard or even impossible to tell that it is there. In This paper, a new text steganography method is proposed. The main goal of this method is to use text file as a carrier for the secret message data in such a manner that the resultant text file attracts no attention and hold the same meaning of the original file.

References
  1. A. I. Abdul-Sada, Hiding Data Using Lsb-3, J. BASRAH Researches (SCIENCES), VOL. 33. , NO. 4. (81-88), Dec. 2007.
  2. A. F. AL-Azawi, M. A. Fadhil, Arabic Text Steganography Using Kashida Extensions With Huffman Codes, Journal of Applied Science, 10(5): 436 - 439, ISSN - 1812-5654, 2010
  3. M. A. F. AL-Husainy, Image Steganography By Mapping Pixels To Letters, Journal of Computer Science, 5 (1): 33-38, ISSN 1549-3636, 2009
  4. A. E. Ali, A New Text Steganography Method By Using Non Printing Unicode Characters, Eng. & Tech. Journal, VOL. 28, NO. 1, 2010
  5. K. C. Chang, C. P. Chang, P. S. Huang, T. M. Tua, A Novel Image Steganographic Method Using Tri-Way Pixel-Value Differencing, Journal of Multimedia, VOL. 3, NO. 2, June 2008
  6. A. A. A. Gutub, M. M. Fattani, A Novel Arabic Text Steganography Method Using Letter Points And Extensions, World Academy of Science, Engineering and Technology 27 2007
  7. J. A. Memon, K. Khowaja, H. Kazi, Evaluation Of Steganography For Urdu /Arabic Text, Journal of Theoretical and Applied Information Technology 2008 JATIT
  8. L. Y. Por, B. Delina, Information Hiding: A New Approach In Text Steganography, 7th WSEAS int. Conf. on Applied Computer & Applied Computational Science (ACACOS '08), Hangzhou, China, April 6-8, 2008
  9. M. H. S. Shahreza, M. S. Shahreza, Arabic/Persian Text Steganography Utilizing Similar Letters With Different Codes The Arabian Journal For Science And Engineering, Volume 35, Number 1b
  10. A. Cheddad, Steganoflage:A New Image Steganography Algorithm, School of Computing & Intelligent Systems, Faculty of Computing & Engineering, University of Ulster, September, 2009.
  11. P. Bateman, H. G. Schaathun, Image Steganography And Steganalysis, Department Of Computing, Faculty of Engineering and Physical Sciences, University of Surrey, Guildford, Surrey, United Kingdom, 4th August 2008
  12. K. Bennett, Linguistic Steganography: Survey, Analysis, And Robustness Concerns For Hiding Information In Text, Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086, CERIAS Tech Report 2004-13
  13. J. Watkins, Steganography - Messages Hidden In Bits, Multimedia Systems Coursework, Department of Electronics and Computer Science, University of Southampton, So17 1bj, UK, 15th December 2001
Index Terms

Computer Science
Information Sciences

Keywords

Data hiding Steganography Stegogramme Carrier Secret message