skip to main content
10.1145/1838002.1838069acmotherconferencesArticle/Chapter ViewAbstractPublication PagesfitConference Proceedingsconference-collections
research-article

Digital steganography for ASCII text documents Ph.D. research proposal

Published:16 December 2009Publication History

ABSTRACT

The digitization of analog signals has inadvertently opened doors for Covert Channel communication which is being exploited as an innocent carrier of Secret information. A number of techniques have been proposed and are in use to attain confidentiality, integrity and authentication for on-line transaction/exchange of messages of which Cryptography and Steganography stands ahead.

Cryptography is focused on changing the contents in a manner difficult for the adversary to interpret. Steganography, on the other hand emphasizes on hiding the existence of secret information i.e. making these appear as non-existent.

The ability to express more in fewer bits and less printing cost involved has made Text file format as an ideal candidate for hiding priceless secrets inside its body.

This Ph.D. research proposal aims at evolving a new steganographic technique for hiding information in digital ASCII Text documents, an area of research considered as the most difficult [1] because digital ASCII Text documents are devoid of any extra overhead to hide information within it. This is followed by software implementation / simulation of the concept together with proposing new / enhancing some existing text-based Steganographic techniques / methods.

References

  1. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding IBM Systems Journal, Vol. 35, Issues 3&4, pp. 313--336, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Dave Kleiman (Technical Editor), Kevin Cardwell, Timothy Clinton, Michael Cross, Michael Gregg, Jesse Varsalone, The Official CHFI Study Guide (Exam 312--49) for Computer Hacking Forensic Investigators, Published by: Syngress Publishing, Inc., Elsevier, Inc., 30 Corporate Drive, Burlington, MA 01803, Craig Wright Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Boston - London Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Nedeljko Cvejic, Algorithms For Audio Watermarking And-Steganography, Department of Electrical and Information engineering, Information Processing Laboratory, University of Oulu, 2004.Google ScholarGoogle Scholar
  5. Jessica Fridrich, Tomáš Pevný, Jan Kodovský, Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities, Copyright 2007 ACM 978-1-59593-857-2/07/0009 ...$5.00.Google ScholarGoogle Scholar
  6. Mohammad Sirali-Shahreza, M. Hassan Shirali- Shahreza, Text Steganography in Chat, 1-4244-1007/07 © 2007 IEEEGoogle ScholarGoogle Scholar
  7. Mohammad Shirali-Shahreza, Text Steganography by Changing Words Spelling, ISBN 978-89-5519-136-3, Feb. 17--20, 2008 ICACT 2008Google ScholarGoogle Scholar
  8. M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza, A New Synonym Text Steganography, International Conference on Intelligent Information Hiding and Multimedia Signal Processing 978-0-7695-3278-3/08 © 2008 IEEE Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Mercan Topkara, Umut Topkara, Mikhail J. Atallah, Information Hiding Through Errors: A Confusing Approach, Purdue UniversityGoogle ScholarGoogle Scholar
  10. Tsung-Yuan Liu, Wen-Hsiang Tsai, and Senior Member, A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique, 1556--6013 © 2007 IEEEGoogle ScholarGoogle Scholar
  11. NeoByte Solutions, "Invisible Secrets 4", http://www.invisiblesecrets.com/index.htmlGoogle ScholarGoogle Scholar
  12. Mohammad Shirali Shahreza, A New Method for Steganography in HTML Files, Computer, Information, and Systems Sciences, and Engineering, Proceedings of IETA 2005, TeNe 2005, EIAE 2005, 247--251, SpringerGoogle ScholarGoogle Scholar
  13. K. Bennett, "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text", Purdue University, CERIAS Tech. Report 2004--13Google ScholarGoogle Scholar
  14. HIPS Systems, "Shadow Text", http://home.apu.edu/~jcox/projects/HtmlStegolGoogle ScholarGoogle Scholar
  1. Digital steganography for ASCII text documents Ph.D. research proposal

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            FIT '09: Proceedings of the 7th International Conference on Frontiers of Information Technology
            December 2009
            446 pages
            ISBN:9781605586427
            DOI:10.1145/1838002

            Copyright © 2009 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 16 December 2009

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
          • Article Metrics

            • Downloads (Last 12 months)5
            • Downloads (Last 6 weeks)0

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader