We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Hiding Data in Text using ASCII Mapping Technology (AMT)

by Souvik Bhattacharyya, Pabak Indu, Gautam Sanyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 18
Year of Publication: 2013
Authors: Souvik Bhattacharyya, Pabak Indu, Gautam Sanyal
10.5120/12169-8282

Souvik Bhattacharyya, Pabak Indu, Gautam Sanyal . Hiding Data in Text using ASCII Mapping Technology (AMT). International Journal of Computer Applications. 70, 18 ( May 2013), 29-37. DOI=10.5120/12169-8282

@article{ 10.5120/12169-8282,
author = { Souvik Bhattacharyya, Pabak Indu, Gautam Sanyal },
title = { Hiding Data in Text using ASCII Mapping Technology (AMT) },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 18 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 29-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number18/12169-8282/ },
doi = { 10.5120/12169-8282 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:33:12.761127+05:30
%A Souvik Bhattacharyya
%A Pabak Indu
%A Gautam Sanyal
%T Hiding Data in Text using ASCII Mapping Technology (AMT)
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 18
%P 29-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In current digitized world humane race is facing a great revolution over Internet technologies, as a result every single information needs to be transmitted through a communication network. This results a different level of attack over these information. This attacks, misuse or unauthorized access of this information are greatest concern of today's world. Steganography means "covered or hidden writing", originated from Greek language, an ancient art of protecting information. Considerable amount of work has been carried out by different researchers on Steganography. In this paper the authors propose a novel text steganography method based on ASCII Mapping Technology (AMT) on English language producing stego text with which is visibly indistinguishable from the original cover text. There is an extra level of security which is achieved through a derived quantum gate. This solution is independent of the nature of the data to be hidden and produces a stego text with minimum degradation and applicable for other India languages also. Quality of the stego text is analyzed by tradeoff between no of bits used for mapping. Efficiency of the proposed method is illustrated by exhaustive experimental results and comparisons.

References
  1. Digital Watermarking :A Tutorial Review S. P. Mohanty ,1999.
  2. Ross J. Anderson and Fabien A. P. Petitcolas, "On the limits of steganography," IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright & Privacy Protection, vol. 16 no. 4, pp 474-481, May 1998.
  3. T Mrkel,JHP Eloff and MS Olivier . "An Overview of Image Steganography,"in proceedings of the fifth annual Information Security South Africa Conference ,2005 .
  4. Gustavus J. Simmons, "The Prisoners' Problem and the Subliminal Channel", in Proceedings of CRYPTO '83, pp 51-67. Plenum Press (1984).
  5. "Stretching the Limits of Steganography", RJ Anderson, in Information Hiding, Springer Lecture Notes in Computer Science v 1174 (1996) pp 39-48.
  6. Scott Craver, "On Public-key Steganography in the Presence of an Active Warden," in Proceedings of 2nd International Workshop on Information Hiding, April 1998, Portland, Oregon, USA. pp. 355 - 368.
  7. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding", IBM Systems Journal, vol. 35, Issues 3&4, 1996, pp. 313-336.
  8. N. F. Johnson and S. Jajodia, "Steganography: seeing the unseen," IEEE Computer. ,Feb. , 26-34 (1998).
  9. L. M. Marvel, C. G. Boncelet, Jr. and C. T. Retter, "Spread spectrum image steganography," IEEE Trans. on Image Processing, 8(8), 1075-1083 (1999).
  10. Analysis of LSB Based Image Steganography Techniques ,R. Chandramouli, Nasir Memon, Proc. IEEE ICIP, 2001.
  11. An Evaluation of Image Based Steganography Methods,Kevin Curran, Kran Bailey, International Journal of Digital Evidence,Fall 2003.
  12. K. Gopalan, "Audio steganography using bit modification", Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP '03), vol. 2, 6-10 April 2003, pp. 421-424.
  13. K. Gopalan, "Audio steganography using bit modification", Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP '03), vol. 2, 6-10 April 2003, pp. 421-424.
  14. M. Chapman, G. Davida, and M. Rennhard, "A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography", Proceedings of the Information Security Conference, October 2001, pp. 156-165.
  15. "Study of Secure Steganography model" by Souvik Bhattacharyya and Gautam Sanyal at the proceedings of "International Conference on Advanced Computing & Communication Technologies (ICACCT-2008),Nov, 2008, Panipat, India"
  16. "An Image based Steganography model for promoting Global Cyber Security" by Souvik Bhattacharyya and Gautam Sanyal at the proceedings of "International Conference on Systemics,Cybernetics and Informatics (ICSCI- 2009),Jan, 09,Hyderabad,India. "
  17. "Implementation and Design of an Image based Steganographic model" by Souvik Bhattacharyya and Gautam Sanyal at the proceedings of " IEEE International Advance Computing Conference "(IACC-2009)"
  18. Novel Approach to Develop a Secure Image based Steganographic Model using Integer Wavelet Transform" at the proceedings of International Conference on Recent Trends in Information, Telecommunication and Computing (ITC 2010)" by Souvik Bhattacharyya, Avinash Prasad Kshitij and Gautam Sanyal. (Indexed by IEEE Computer Society).
  19. Y. Kim, K. Moon, and I. Oh, "A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics", Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR'03), 2003, pp. 775–779.
  20. L. Y. Por and B. Delina, "Information Hiding: A New Approach in Text Steganography", 7th WSEAS International Conference on Applied Computer & Applied Computational Science, April 2008, pp- 689-695.
  21. A. M. Alattar and O. M. Alattar, "Watermarking electronic text documents containing justified paragraphs and irregular line spacing ", Proceedings of SPIE - Volume5306, Security, Steganography, and Watermarking of Multimedia Contents VI, June 2004, pp- 685-695.
  22. P. Wayner, "Strong Theoretical Steganography", Cryptologia, XIX(3), July 1995, pp. 285-299.
  23. M. Niimi, S. Minewaki, H. Noda, and E. Kawaguchi, "A Framework of Text-based Steganography Using SD-Form Semantics Model", Pacific Rim Workshop on Digital Steganography 2003, Kyushu Institute of Technology, Kitakyushu, Japan, July 3-4, 2003.
  24. Hiding Data in Text Through Changing in Alphabet Letter Patterns (CALP) by Souvik Bhattacharyya, Pabak Indu , Sanjana Dutta , Ayan Biswas and Gautam Sanyal at Journal of Global Research in Computer Science (JGRCS) VOL 2, NO 3 (2011) MARCH-2011.
  25. "Text Steganography using CALP with High Embedding Capacity" by Souvik Bhattacharyya, Pabak Indu , Sanjana Dutta , Ayan Biswas and Gautam Sanyal at Journal of Global Research in Computer Science (JGRCS) VOL 2, NO 5 (2011) MAY-2011.
  26. M. H. Shirali-Shahreza and M. Shirali-Shahreza, "Text Steganography in Chat", Proceedings of the Third IEEE/IFIP International Conference in Central Asia on Internet the Next Generation of Mobile, Wireless and Optical Communications Networks (ICI 2007), Tashkent, Uzbekistan, September 26-28, 2007.
  27. Mohammad Shirali-Shahreza. Text steganography by changing words spelling. In ICACT, 2008.
  28. Gutub, A. A. and Fattani, M. M. Text steganography by using letter points and extensions. World Academy of Science, Engineering and Technology 27 ,2007, pages 13–27, 2007.
  29. Souvik Bhattacharyya, I. B. and Sanyal, G. A novel approach of secure text based steganography model using Word Mapping Method (WMM) International Journal of Computer and Information Engineering, 4:96–103, 2010.
  30. D. Deutsch. Quantum theory, the church-turing principle and the universal quantum computer. Proc. Roy. Soc. Lond. A, 400 (1985), 97-117.
  31. D. Deutsch. Quantum computational networks. Proc. Roy. Soc. Lond. A, 425 (1989), 73-90.
  32. R. P. Feynman. Quantum mechanical computers. Found. Phys. 16(1986), 507.
  33. Geert Uytterhoeven Dirk Roose Adhemar Bultheel. Integer wavelet transforms using the lifting scheme. In CSCC Proceedings, 1999.
  34. W. Sweldens. The lifting scheme. A construction of second generation wavelets. SIAM J. Math. Anal. , 29:511–546, 1997.
  35. W. Sweldens R. Calderbank, I. Daubechies and B. L. Yeo. Wavelet transforms that map integers to integers. Appl. Comput. Harmon. Anal. ,5:332–369, 1998.
  36. "A Mathematical Theory of Communication" By C. E. SHANNON, at The Bell System Technical Journal, Vol. 27, pp. 379–423, 623–656, July, October, 1948.
  37. S. Dowdy and S. Wearden. Statistics for research. Wiley. ISBN 0471086029, page 230, 1983.
  38. W. E. Winkler. The state of record linkage and current research problems. Statistics of Income Division, Internal Revenue Service Publication R99/04. , 1999.
  39. M. A. Jaro. Advances in record linking methodology as applied to the 1985 census of tampa florida. Journal of the American Statistical Society. 84:414–420, 1989.
  40. M. A. Jaro. Probabilistic linkage of large public health data file. Statistics in Medicine 14 (5-7). , pages 491–498, 1995.
Index Terms

Computer Science
Information Sciences

Keywords

AMT (ASCII Mapping Technology) CS gate CSN gate POS file Jaro-Winkler Distance