Abstract
Data and information leakage is one of the prevalent tribulations in today’s internet world during transfer. Traditional algorithms are not enough to hide data/information theft. This is the reason behind developing number system oriented text Steganography for short messages. This is the permutation of art and science appears as non existence of required data put out of sight. A novel method can be used to hide all the characters starting from A to Z, a to z, numeric like 0 to 9 and special characters where any language can take a part. This is possible to hide a message transmitting in the form of SMS, WhatsApp, Email or facebook messenger. An excellent blend of number of pairs shape words, numbers to hide information. This paper could be very much useful for developing application for concealing secret data/information for army, navy of air force for sake of saving motherland.
References
Detailed about this statistic/trend. http://www.grabstats.com/statmain.aspx?StatID=402. Accessed Mar 2017
Messenger and WhatsApp process 60 billion messages a day, three times more than SMS. http://www.theverge.com/2016/4/12/11415198/facebook-messenger-whatsapp-number-messages-vs-sms-f8-2016. Accessed Mar 2017
Jagetiya, A., Rama Krishna, C.: Digital image steganography “seeing is always not believing” research front. CSI Commun. 38(3), 23–26 (2014)
Chandramouli, R., Memon, N.: Analysis of LSB based image Steganography techniques. In: Proceedings of the International Conference on Image Processing, 7–10 October, vol. 3, pp. 1019–1022 (2001)
Kumar, R., Malik, A., Singh, S., Kumar, B., Chand, S.:A space based reversible high capacity text steganography scheme using font type and style. In: ICCCA, 29–30 April 2016. IEEE (2016)
Sharma, S., Gupta, A., Trivedi, M.C., Yadav, V.K.: Analysis of different text steganography techniques: a survey. In: Computational Intelligence and Communication Technology (CICT), 12–13 February 2016. IEEE (2016)
Gupta, S., Jain, R.: An innovative method of text steganography. In: Image Information Processing (ICIIP), 21–24 December 2015. IEEE (2015)
Shi, S., Qi, Y., Huang, Y.: An approach to text steganography based on search in internet. In: International Computer Symposium (ICS), 15–17 December 2016
Chen, T.S.C., Cheng, M.W.: A new data hiding scheme in binary image. In: Proceedings of the Fifth International Symposium on Multimedia Software Engineering, pp. 88–93 (2003)
Judge, J.C.: Steganography: past, present, future, SANS white paper. http://www.sans.org/rr/papers/index.php?id=552. Accessed Mar 2017
Shirali Shahreza, M.: An improved method for steganography on mobile phone. WSEAS Trans. Syst. 4(7), 955–957 (2005)
Doërr, G., Dugelay, J.L.: A guide tour of video watermarking. Sig. Process. Image Commun. 18(4), 263–282 (2003)
Doërr, G., Dugelay, J.L.: Security pitfalls of frame by frame approaches to video watermarking. IEEE Trans. Sig. Process. Suppl. Secur. Media 52(10), 2955–2964 (2004)
Gopalan, K.: Audio steganography using bit modification. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2003, 6–10 April 2003, vol. 2, pp. 421–424 (2003)
Brassil, J.T., Low, S., Maxemchuk, N.F., O’Gorman, L.: Electronic marking and identification techniques to discourage document copying. IEEE J. Sel. Areas Commun. 13(8), 1495–1504 (1995)
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3&4), 313–336 (1996)
Provos, N., Honeyman, P.: Hide and seek- an introduction to steganography. IEEE Secur. Priv. 1(3), 32–44 (2003)
Bennett, K.: Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text, Purdue University, CERIAS Technical report (2004-13)
Moerland, T.: Steganography and Steganalysis. www.liacs.nl/home/tmoerlan/privtech.pdf. Accessed Mar 2017
Low, S.H., Maxemchuk, N.F., Brassil, J.T., O’Gorman, L.: Document marking and identification using both line and word shifting. In: Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 1995, vol. 2, pp. 853–860, 2–6 April 1995
Mandal, K.K., Jana, A., Agarwal, V.: A new approach of text Steganography based on mathematical model of number system. In: Circuit, Power and Computing Technologies (ICCPCT), pp. 1737–1741, 20–21 March 2014. IEEE (2014)
Koley, S., Mandal, K.K.: A novel approach of secret message passing through text steganography. In: International Conference on Signal Processing, Communication, Power and Embedded System, SCOPES – 2016, 3–5 October 2016, pp. 21–26 (2016). Issue – III, 978-1-5090-4620-1/16/$31.00 ©2016 IEEE, ISBN CPF16H12-PRT/978-1-5090-4619-5
Mandal, K.K.,Koley, S., Dhar, S.: A mathematical model for secret message passing using Steganography. In: Computational Intelligence and Computing Research (ICCIC), pp. 1–6, 15–17 December 2016. IEEE
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Koley, S., Mandal, K.K. (2017). Number System Oriented Text Steganography in Various Language for Short Messages. In: Mandal, J., Dutta, P., Mukhopadhyay, S. (eds) Computational Intelligence, Communications, and Business Analytics. CICBA 2017. Communications in Computer and Information Science, vol 775. Springer, Singapore. https://doi.org/10.1007/978-981-10-6427-2_44
Download citation
DOI: https://doi.org/10.1007/978-981-10-6427-2_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6426-5
Online ISBN: 978-981-10-6427-2
eBook Packages: Computer ScienceComputer Science (R0)