IBM Systems Journal
A New Approach to Persian/Arabic Text Steganography
ICIS-COMSAR '06 Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse
A Steganalysis Method Based on the Distribution of First Letters of Words
IIH-MSP '06 Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia
Research on Steganalysis for Text Steganography Based on Font Format
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
A New Synonym Text Steganography
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Detection of word shift steganography in PDF document
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Hi-index | 0.00 |
Steganography gained importance in the past few years due to the increasing need for providing secrecy in an open environment like the internet. With almost anyone can observe the communicated data all around, steganography attempts to hide the very existence of the message and make communication undetectable. Steganography has many technical challenges such as high hiding capacity and imperceptibility. In this paper, we try to evolve an algorithm on text steganography using the combination of line shifting and word shifting methods with copy protection technique with high capacity of the cover object. Word shift embeds secret information in text by shifting words slightly. Line shift embeds secret information in text by shifting text lines slightly. Our method hides the secret information in binary form rather than the original character form by using the above methods. This method has a good hiding capacity because it hides more than one bit in each line of cover text. Also this method does not make any apparent changes in the original text.