Cryptologia
Discrete Applied Mathematics
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Plausible Deniability Using Automated Linguistic Stegonagraphy
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
ISC '01 Proceedings of the 4th International Conference on Information Security
Component-based digital watermarking of Chinese texts
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Proceedings of the 2006 ACM symposium on Applied computing
An evaluation of image based steganography methods
Multimedia Tools and Applications
A novel lossless data compression scheme based on the error correcting Hamming codes
Computers & Mathematics with Applications
Listega: list-based steganography methodology
International Journal of Information Security
A reversible information hiding scheme using left-right and up-down chinese character representation
Journal of Systems and Software
A novel adaptive steganography based on local complexity and human vision sensitivity
Journal of Systems and Software
A reversible data hiding scheme using complementary embedding strategy
Information Sciences: an International Journal
BSS: Boosted steganography scheme with cover image preprocessing
Expert Systems with Applications: An International Journal
UniSpaCh: A text-based data hiding method using Unicode space characters
Journal of Systems and Software
Forensic investigation of Microsoft PowerPoint files
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.00 |
In this study, capacity and security issues of text steganography have been considered to improve by proposing a novel approach. For this purpose, a text steganography method that employs data compression has been proposed. Because of using textual data in steganography, the employed data compression algorithm has to be lossless. Accordingly, LZW data compression algorithm has been chosen due to its frequent use in the literature and significant compression ratio. The proposed method constructs - uses stego keys and employs Combinatorics-based coding in order to increase security. Secret information has been hidden in the chosen text from the previously constructed text base that consists of naturally generated texts. Email has been chosen as communication channel between the two parties, so the stego cover has been arranged as a forward mail platform. By means of the proposed scheme, capacity has been reached to 7.042% for the secret message containing 300 characters (or 300.8 bits). Finally, comparison of the proposed scheme with the other contemporary methods in the literature has been carried out. Experimental results show that the proposed scheme provided a significant increment in terms of capacity.