Main Article Content

Hema S
Dr.Kangaiammal A


Steganography is the art of hiding secret information within other information that is digitally concealed. It protects the confidentiality of two communicating parties. Information hiding is a highly strong and adaptable strategy that may be used to protect vital information in a variety of situations. There are several steganography techniques available, each with its own set of advantages and disadvantages. This study presents a new data hiding mechanism that hides file information in text cover messages to safeguard user data from vulnerabilities. It also utilize a deduplication strategy that employs the suggested DSHA algorithm to reduce repeated data storage. This novel technique ensures security while maintaining confidentiality.


Download data is not yet available.

Article Details



Morkel, T., Eloff, J. H., and Olivier, M. S, “An Overview of Image Steganographyâ€, In ISSA, Vol. 1, No. 2, 2005.

Arya, A., and Soni, S, “A Literature Review on Various Recent Steganography Techniquesâ€, International Journal on Future Revolution in Computer Science & Communication Engineering, ISSN: 2454-4248 Vol. 4 Issue: 1,2018.

Alwahbani, Samah, and Elshoush, Huwaida, “Hybrid Audio Steganography and Cryptography Method Based on High Least Significant Bit (LSB) Layers and One-Time Pad—A Novel Approachâ€, PP. 431-453, 10.1007/978-3-319-69266-1_21,2018,

Dr. Rajkumar L Biradar and Ambika Umashetty , â€A Survey Paper on Steganography Techniquesâ€, International Journal of Innovative Research in Computer and Communication Engineering ,Vol. 4, Issue 1, January 2016

Khairullah, M. A novel steganography method using transliteration of Bengali text. J. King Saud Univ.-Comput. Inf. Sci. 2019, 31, 348–366.

Yang, Z.; Xiang, L.; Zhang, S.; Sun, X.; Huang, Y. Linguistic generative steganography with enhanced cognitive-imperceptibility. IEEE Signal. Process. Lett. 2021, 28, 409–413.

Allah Ditta, Muhammad Azeem, Shahid Naseem, Khurram Gulzar Rana, Muhammad Adnan Khan, Zafar Iqbal,â€A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using Unicodeâ€,Journal of King Saud University - Computer and Information Sciences,2020.

Behrooz Khosravi, Behnam Khosravi, Bahman Khosravi, Khashayar Nazarkardeh, A new method for pdf steganography in justified texts, Journal of Information Security and Applications, Volume 45,2019, Pages 61-70, ISSN 2214-2126,

Sadié, Juvet K., Leonel Moyou Metcheka, and René Ndoundam. "Two high capacity text steganography schemes based on color coding." arXiv preprint arXiv:2004.00948 (2020).

J. Hiney, T. Dakve, K. Szczypiorski and K. Gaj, "Using Facebook for Image Steganography," 2015 10th International Conference on Availability, Reliability and Security, 2015, pp. 442-447, doi: 10.1109/ARES.2015.20.

M. Jain and S. K. Lenka, "Secret data transmission using vital image steganography over transposition cipher," 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, pp.1026-1029, doi: 10.1109/ICGCIoT.2015.7380614.

Neetha Francis, 2015, Information Security using Cryptography and Steganography, 53 (IJERT) NSRCL – 2015 (Volume 3 – Issue 28).

Z. Yan, W. Ding, X. Yu, H. Zhu and R. H. Deng, "Deduplication on Encrypted Big Data in Cloud," in IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, June 1 2016.

Xu, J., Chang, E.C., Zhou, J.: Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In: 8th ACM SIGSAC Symposium, pp. 195–206,2011.