Steganography in Artistic Websites
(*) Corresponding author
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)
In line with the expansion of the Internet, the issue of information security has gained special importance. Many methods have been provided in order to establish hidden communications. In the meanwhile, steganography is one of a relatively new method. This paper introduces a new method for exchanging information by steganography on artistic websites. The main idea in this method is to hide data by changing the color of artistic websites items like tables, hyperlinks and texts. The suggested method is implemented by using the Java language.
Copyright © 2018 Praise Worthy Prize - All rights reserved.
J.C. Judge, “Steganography: Past, Present, Future”, SANS white paper, November 30, 2001,
“http://www.sans.org/rr/papers/index.php?id=552”, last visited: 12 January 2007.
R. Chandramouli, and N. Memon, Analysis of LSB based image steganography techniques, Proceedings of the International Conference on Image Processing, vol. 3, 7-10 October 2001, pp. 1019 - 1022.
G. Doërr, and J.L. Dugelay, A Guide Tour of Video Watermarking, Signal Processing: Image Communication, vol. 18, no. 4, April 2003, pp. 263-282.
K. Gopalan, Audio steganography using bit modification, Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '03), vol. 2, 6-10 April 2003, pp. 421-424.
A. M. Alattar, and O.M. Alattar, Watermarking electronic text documents containing justified paragraphs and irregular line spacing, Proceedings of SPIE, Volume 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, June 2004, pp. 685-695.
M. Shirali Shahreza, An Improved Method for steganography on Mobile Phone, WSEAS Transactions on Systems, vol. 4, issue 7, July 2005, pp. 955-957.
D. Goodman, Dynamic HTML: The Definitive Reference (Second Edition, O'Reilly & Associates, Inc., 2002).
E. Castro, HTML 4 for the World Wide Web Fourth Edition (Visual QuickStart Guide, Peachpit Press, 4th Edition, 1999).
HIPS Systems, “ShadowText”,
“http://home.apu.edu/~jcox/projects/HtmlStego1”, last visited: 29 July 2005.
A. Pinet, SecurEngine Professional 1.0,
“http://securengine.isecurelabs.com”, last visited: 12 January 2007.
“http://camouflage.unfiction.com/”, last visited: 12 January 2007.
F. Arefin, Information hiding in images: Implementing a steganographic application for hiding information in images, B.S. Thesis, Computing and Information Systems, University of London, London, England, May 15, 2004.
NeoByte Solutions, “Invisible Secrets 4”,
“http://www.invisiblesecrets.com/index.html”, last visited: 12 January 2007.
S. Forrest, Introduction to Deogol,
“http://www.wandership.ca/projects/deogol/”, last visited: 12 January 2007.
C. John, “Steganography 13 - Hiding binary data in HTML documents”,“http://www.codeproject.com/csharp/steganodotnet.asp”, last visited: 12 January 2007.
M. Shirali-Shahreza, A New Method for Steganography in HTML Files, Proceedings of the International Joint Conference on Computer, Information, and Systems Sciences, and Engineering (CISSE 2005), Bridgeport, CT, December 10- 20, 2005, pp. 247-251.
M. Shirali-Shahreza, Steganography in Wireless Application Protocol," Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications (EuroIMSA 2006), Innsbruck, Austria, February 13-15, 2006, pp. 91-95.
Y. H. Chang and W. H. Tsai, A steganographic method for copyright protection of HTML documents, Proceedings of National Computer Symposium 2003, Taichung, Taiwan, Republic of China, December 2003.
F. Bao and X. Wang, Steganography of Short Messages through Accessories, Proceedings of Pacific Rim Workshop on Digital Steganography 2002 (STEG'02), Japan, July 11-12, 2002, pp. 142-147.
- There are currently no refbacks.
Please send any question about this web site to email@example.com
Copyright © 2005-2022 Praise Worthy Prize