Skip to main content

Number System Oriented Text Steganography in Various Language for Short Messages

  • Conference paper
  • First Online:
Computational Intelligence, Communications, and Business Analytics (CICBA 2017)

Abstract

Data and information leakage is one of the prevalent tribulations in today’s internet world during transfer. Traditional algorithms are not enough to hide data/information theft. This is the reason behind developing number system oriented text Steganography for short messages. This is the permutation of art and science appears as non existence of required data put out of sight. A novel method can be used to hide all the characters starting from A to Z, a to z, numeric like 0 to 9 and special characters where any language can take a part. This is possible to hide a message transmitting in the form of SMS, WhatsApp, Email or facebook messenger. An excellent blend of number of pairs shape words, numbers to hide information. This paper could be very much useful for developing application for concealing secret data/information for army, navy of air force for sake of saving motherland.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Detailed about this statistic/trend. http://www.grabstats.com/statmain.aspx?StatID=402. Accessed Mar 2017

  2. Messenger and WhatsApp process 60 billion messages a day, three times more than SMS. http://www.theverge.com/2016/4/12/11415198/facebook-messenger-whatsapp-number-messages-vs-sms-f8-2016. Accessed Mar 2017

  3. Jagetiya, A., Rama Krishna, C.: Digital image steganography “seeing is always not believing” research front. CSI Commun. 38(3), 23–26 (2014)

    Google Scholar 

  4. Chandramouli, R., Memon, N.: Analysis of LSB based image Steganography techniques. In: Proceedings of the International Conference on Image Processing, 7–10 October, vol. 3, pp. 1019–1022 (2001)

    Google Scholar 

  5. Kumar, R., Malik, A., Singh, S., Kumar, B., Chand, S.:A space based reversible high capacity text steganography scheme using font type and style. In: ICCCA, 29–30 April 2016. IEEE (2016)

    Google Scholar 

  6. Sharma, S., Gupta, A., Trivedi, M.C., Yadav, V.K.: Analysis of different text steganography techniques: a survey. In: Computational Intelligence and Communication Technology (CICT), 12–13 February 2016. IEEE (2016)

    Google Scholar 

  7. Gupta, S., Jain, R.: An innovative method of text steganography. In: Image Information Processing (ICIIP), 21–24 December 2015. IEEE (2015)

    Google Scholar 

  8. Shi, S., Qi, Y., Huang, Y.: An approach to text steganography based on search in internet. In: International Computer Symposium (ICS), 15–17 December 2016

    Google Scholar 

  9. Chen, T.S.C., Cheng, M.W.: A new data hiding scheme in binary image. In: Proceedings of the Fifth International Symposium on Multimedia Software Engineering, pp. 88–93 (2003)

    Google Scholar 

  10. Judge, J.C.: Steganography: past, present, future, SANS white paper. http://www.sans.org/rr/papers/index.php?id=552. Accessed Mar 2017

  11. Shirali Shahreza, M.: An improved method for steganography on mobile phone. WSEAS Trans. Syst. 4(7), 955–957 (2005)

    Google Scholar 

  12. Doërr, G., Dugelay, J.L.: A guide tour of video watermarking. Sig. Process. Image Commun. 18(4), 263–282 (2003)

    Article  Google Scholar 

  13. Doërr, G., Dugelay, J.L.: Security pitfalls of frame by frame approaches to video watermarking. IEEE Trans. Sig. Process. Suppl. Secur. Media 52(10), 2955–2964 (2004)

    Article  Google Scholar 

  14. Gopalan, K.: Audio steganography using bit modification. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2003, 6–10 April 2003, vol. 2, pp. 421–424 (2003)

    Google Scholar 

  15. Brassil, J.T., Low, S., Maxemchuk, N.F., O’Gorman, L.: Electronic marking and identification techniques to discourage document copying. IEEE J. Sel. Areas Commun. 13(8), 1495–1504 (1995)

    Article  Google Scholar 

  16. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3&4), 313–336 (1996)

    Article  Google Scholar 

  17. Provos, N., Honeyman, P.: Hide and seek- an introduction to steganography. IEEE Secur. Priv. 1(3), 32–44 (2003)

    Article  Google Scholar 

  18. Bennett, K.: Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text, Purdue University, CERIAS Technical report (2004-13)

    Google Scholar 

  19. Moerland, T.: Steganography and Steganalysis. www.liacs.nl/home/tmoerlan/privtech.pdf. Accessed Mar 2017

  20. Low, S.H., Maxemchuk, N.F., Brassil, J.T., O’Gorman, L.: Document marking and identification using both line and word shifting. In: Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 1995, vol. 2, pp. 853–860, 2–6 April 1995

    Google Scholar 

  21. Mandal, K.K., Jana, A., Agarwal, V.: A new approach of text Steganography based on mathematical model of number system. In: Circuit, Power and Computing Technologies (ICCPCT), pp. 1737–1741, 20–21 March 2014. IEEE (2014)

    Google Scholar 

  22. Koley, S., Mandal, K.K.: A novel approach of secret message passing through text steganography. In: International Conference on Signal Processing, Communication, Power and Embedded System, SCOPES – 2016, 3–5 October 2016, pp. 21–26 (2016). Issue – III, 978-1-5090-4620-1/16/$31.00 ©2016 IEEE, ISBN CPF16H12-PRT/978-1-5090-4619-5

    Google Scholar 

  23. Mandal, K.K.,Koley, S., Dhar, S.: A mathematical model for secret message passing using Steganography. In: Computational Intelligence and Computing Research (ICCIC), pp. 1–6, 15–17 December 2016. IEEE

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Santanu Koley .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Koley, S., Mandal, K.K. (2017). Number System Oriented Text Steganography in Various Language for Short Messages. In: Mandal, J., Dutta, P., Mukhopadhyay, S. (eds) Computational Intelligence, Communications, and Business Analytics. CICBA 2017. Communications in Computer and Information Science, vol 775. Springer, Singapore. https://doi.org/10.1007/978-981-10-6427-2_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6427-2_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6426-5

  • Online ISBN: 978-981-10-6427-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics