Cryptologia
IBM Systems Journal
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Plausible Deniability Using Automated Linguistic Stegonagraphy
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Proceedings of the First International Workshop on Information Hiding
Hiding Data in the OSI Network Model
Proceedings of the First International Workshop on Information Hiding
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
ISC '01 Proceedings of the 4th International Conference on Information Security
Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Exploiting Linguistic Features in Lexical Steganography: Design and Proof-of-Concept Implementation
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 06
Proceedings of the 2006 ACM symposium on Applied computing
A New Approach to Persian/Arabic Text Steganography
ICIS-COMSAR '06 Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
Graphstega: Graph Steganography Methodology
Journal of Digital Forensic Practice
Nostega: A Novel Noiseless Steganography Paradigm
Journal of Digital Forensic Practice
Listega: list-based steganography methodology
International Journal of Information Security
Nostega: a novel noiseless steganography paradigm
Nostega: a novel noiseless steganography paradigm
Comprehensive linguistic steganography survey
International Journal of Information and Computer Security
A method of linguistic steganography based on collocationally-verified synonymy
IH'04 Proceedings of the 6th international conference on Information Hiding
Translation-based steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
Is image steganography natural?
IEEE Transactions on Image Processing
Sumstega: summarisation-based steganography methodology
International Journal of Information and Computer Security
Jokestega: automatic joke generation-based steganography methodology
International Journal of Security and Networks
Hi-index | 0.00 |
The frequent exchange of e-mails is widely popular and generates a high volume of traffic that allows communicating parties to establish a covert channel without a suspicious pattern rendering e-mails an attractive steganographic carrier to transmit hidden messages. This was the motive of developing e-mail-headers-based steganography methodology (Headstega). Headstega encodes a message then assigns it to steganographic carriers (e-mail-headers), e.g. recipient's e-mail addresses, names, subject fields, etc., in order to camouflage data by following Nostega paradigm. Thus, Headstega neither hides data in a noise (errors) nor produces noise while a message is concealed in the textual e-mail headers and the e-mail contents (the body of e-mails) are completely legitimate and do not conceal data. The presented implementation, validation and steganalysis of Headstega demonstrate: the robust capabilities of achieving the steganographic goal, the adequate room for concealing data and the superior bitrate to all contemporary text steganography approaches, which is roughly 3.38 7.67%.