Open Access Open Access  Restricted Access Subscription or Fee Access

An Approach for Text Steganography: Generating Tamil Text Summary Using Tamil Phonetics


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v10i2.5196

Abstract


Steganography is the ability and science of enclosed or secreted writing. The idea of steganography is masked communication to hide the existence of a message from the interfering eyes. Digital Steganography algorithms have been developed by using text documents, image files and audio files as the cover media. This paper presents an approach for converting a secret message into a Text summary in Tamil language and that is transmitted over communication channel. The proposed method classifies the Tamil alphabets into four groups to hide secret data bits and it selects the sentence to generate a summary of the text, known as stego text. Similarly at the extraction end, the receiver extracts the characters from the stego text by following the groups and places the corresponding bits to get the secret message from the summary generated by the hiding process. This proposed method exhibits a satisfactory experimental result with the cover text chosen.
Copyright © 2015 Praise Worthy Prize - All rights reserved.

Keywords


Information Security; Phonetics of Tamil Alphabets; Text Steganography and Text Summary

Full Text:

PDF


References


C. Cachin, “An Information-Theoretic Model for Steganography”, in proceeding 2nd Information Hiding Workshop, vol. 1525, pp. 306-318, 1998
http://dx.doi.org/10.1007/3-540-49380-8_21

R Chandramouli, N. Memon, “Analysis of LSB Based Image Steganography Techniques”, IEEE pp. 1019-1022,2001.
http://dx.doi.org/10.1109/icip.2001.958299

N.F. Johnson, S. Jajodia, “Staganalysis: The Investigation of Hiding Information”, IEEE, pp. 113-116, 1998.

D. Artz, “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing, pp. 75-80, May-Jun 2001.
http://dx.doi.org/10.1109/4236.935180

Herodotus. The Histories. Penguin Books, London, 1996. Translated by Aubrey de Sélincourt.
http://dx.doi.org/10.1017/s0009840x00169999

G. Simmons, “The prisoners problem and the subliminal channel,” CRYPTO, pp.51–67, 1983.
http://dx.doi.org/10.1007/978-1-4684-4730-9_5

J. Chen, T. S. Chen, M. W. Cheng, “A New Data Hiding Scheme in Binary Image,” in Proc. Fifth Int. Symp. on Multimedia Software Engineering. Proceedings, pp. 88-93 (2003).
http://dx.doi.org/10.1109/mmse.2003.1254426

Shobana, M., Gitanjali, P., Rajesh, M., Manikandan, R., A novel approach for hiding image using pixel intensity, (2013) International Review on Computers and Software (IRECOS), 8 (4), pp. 904-908.

G. Doërr and J.L. Dugelay, "A Guide Tour of Video Watermarking", Signal Processing: Image Communication, vol. 18, Issue 4, 2003, pp.263-282.
http://dx.doi.org/10.1016/s0923-5965(02)00144-3

G. Doërr and J.L. Dugelay, "Security Pitfalls of Frameby- Frame Approaches to Video Watermarking", IEEE Transactions on Signal Processing, Supplement on Secure Media, vol. 52, Issue 10, 2004, pp. 2955-2964.
http://dx.doi.org/10.1109/tsp.2004.833867

K. Gopalan, "Audio steganography using bit modification", Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing,(ICASSP '03), vol. 2, 6-10 April 2003, pp. 421-424.
http://dx.doi.org/10.1109/icassp.2003.1202390

Valarmathi, R., Kadhar Nawaz, G.M., An enriched audio steganography for secret message communication using novel embedding technique, (2014) International Review on Computers and Software (IRECOS), 9 (10), pp. 1645-1651.
http://dx.doi.org/10.15866/irecos.v9i10.3808

J.T. Brassil, S. Low, N.F. Maxemchuk, and L.O’Gorman, "Electronic Marking and Identification Techniques to Discourage Document Copying", IEEE Journal on Selected Areas in Communications, vol. 13, Issue. 8, October 1995, pp. 1495-1504.
http://dx.doi.org/10.1109/49.464718

P. Wayner, “Mimic functions”, Cryptologia XVI, pp. 193–214, July 1992.
http://dx.doi.org/10.1080/0161-119291866883

M. T. Chapman, “Hiding the hidden: A software system for concealing ciphertext as innocuous text”, Master‘s thesis, University of Wisconsin-Milwaukee, May 1997.
http://dx.doi.org/10.1007/bfb0028489

Peng Meng, Liusheng Huang, Zhili Chen, Wei Yang, Dong Li,” Linguistic Steganography Detection Based on Perplexity”, International Conference on MultiMedia and Information Technology, pp 217-220, 2008.
http://dx.doi.org/10.1109/mmit.2008.29

T.Moerland,"Steganography and Steganalysis", May 15, 2003, www.liacs.nl/home/tmoerlan/privtech.pdf.

S.H. Low, N.F. Maxemchuk, J.T. Brassil, and L.O'Gorman, "Document marking and identification using both line and word shifting", Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '95), 2-6 April 1995,vol.2, pp. 853 - 860.
http://dx.doi.org/10.1109/infcom.1995.515956

A. M. Alattar and O.M. Alattar, "Watermarking electronic text documents containing justified paragraphs and irregular line spacing ", Proceedings of SPIE – Volume 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, June 2004, pp. 685-695.
http://dx.doi.org/10.1117/12.527147

K. Bennett, "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text", Purdue University, CERIAS Tech. Report 2004-13.

Y. Kim, K. Moon, and I. Oh, "A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics", Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR’03), 2003, pp. 775–779
http://dx.doi.org/10.1109/icdar.2003.1227767

K. Rabah, "Steganography-The Art of Hiding Data", Information Technology Journal, vol. 3, Issue 3, pp. 245-269, 2004.
http://dx.doi.org/10.3923/itj.2004.245.269

Shirali-Shahreza, M.H.; Shirali-Shahreza, M., “A New Approach to Persian/Arabic Text Steganography “,Computer and Information Science, 2006. ICIS-COMSAR 2006. 5th IEEE/ACIS International Conference on 10-12 July 2006 Page(s):310 – 315
http://dx.doi.org/10.1109/icis-comsar.2006.10

D. Huang, and H. Yan, "Interword Distance Changes Represented by Sine Waves for Watermarking Text Images", IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 12, December 2001, pp. 1237-1245.
http://dx.doi.org/10.1109/76.974678

S. Changder, N.C. Debnath , “An Approach to Bengali Text Steganography”, Proceedings of the International Conference on Software Engineering and Data Engineering (SEDE-08), ISBN: 978-1-880843-67-3, pp. 74-78, July, 2008, Los Angeles, California, USA.

S. Changder, N.C. Debnath, D. Ghosh, “LCS based Text Steganography through Indian Languages” Proceedings of 2010 3rd IEEE International Conference on Computer Science and Information Technology(ICCSIT 2010), ISBN: 978-1-4244-5539-3,pp. 53-58(vol 8) July, 2010, Chengdu, China
http://dx.doi.org/10.1109/iccsit.2010.5563974

Shraddha Dulera, Devesh Jinwala, Aroop Dasgupta, “Experimenting with the Novel Approaches in Text Steganography” International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
http://dx.doi.org/10.5121/ijnsa.2011.3616

S. Changder, S.Das, D.Ghosh, “Text Steganography through Indian Languages using Feature Coding Method”, Proceedings of the 2nd International Conference on Computer Technology and Development (ICCTD), 2010, 10.1109/ICCTD.2010.5645849, Page(s): 501 – 505, November 2010, Cairo.
http://dx.doi.org/10.1109/icctd.2010.5645849

Anandaprova Majumdera, Suvamoy Changderb “A Novel Approach for Text Steganography: Generating Text Summary using Reflection Symmetry”, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013
http://dx.doi.org/10.1016/j.protcy.2013.12.343

Kiani, K., Firoozi, A.H., Information coding and steganography using fractal in multimedia's, (2011) International Journal on Communications Antenna and Propagation (IRECAP), 1 (3), pp. 254-257.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize