01-05-2012, 11:42 AM
A Novel Approach of Secure Text Based Steganography Model using Word Mapping Method
v4-2-15[1].pdf (Size: 542.1 KB / Downloads: 60)
INTRODUCTION
THE technique of information hiding has been widely
applied on various fields during the recent years [8]
and the two major branches, viz. digital watermarking and
steganography have been derived [14], [20]. Digital watermarking
provides the protection of intellectual property,
whereas steganography concerns privacy of information under
surveillance. Steganalysis is the art of detecting any hidden
message on the communication channel. If the existence of the
hidden message is revealed, the goal of steganography is defeated.
Steganography is an ancient art of conveying messages
in a secret way that only the receiver knows the existence
of the message [13].
Random and statistical generation methods
Random and statistical generation methods are used to
generate cover-text automatically according to the statistical
properties of language. These methods use example grammars
to produce cover-text in a certain natural language. A probabilistic
context-free grammar (PCFG) is a commonly used
language model where each transformation rule of a contextfree
grammar has a probability associated with it [13]. A
PCFG can be used to generate word sequences by starting with
the root node and recursively applying randomly chosen rules.
The sentences are constructed according to the secret message
to be hidden in it.
PROPOSED METHOD
Fig.6 below shows the block diagram of the proposed text
steganography model.This work is based on the new text
steganography method proposed in [28]. Here the authors
propose a new method of information hiding in a text by
inserting extra blank space between the words of odd or
even size according to the embedding sequence and also in
some cases the blank spaces in between the words of the
original cover text may be used for mapping each two bit
of the embedding sequence Fig.5 below shows the mapping
information.In the proposed system the secret message is
first encoded using the proposed encrypting algorithm .
CONCLUSION
In this paper the authors presented a new approach of text
steganography method by inserting extra blank space between
the words of odd or even size of the cover according to
International Journal of Computer and Information Engineering
the embedding sequence and also in some cases only the
blank space between the words of the original cover text may
be used as mapping the embedding sequence. This property
generates the stego text with minimum or zero degradation.