SECURE DATA HIDING MECHANISM USING TEXT COVER MESSAGE
Main Article Content
Abstract
Steganography is the art of hiding secret information within other information that is digitally concealed. It protects the confidentiality of two communicating parties. Information hiding is a highly strong and adaptable strategy that may be used to protect vital information in a variety of situations. There are several steganography techniques available, each with its own set of advantages and disadvantages. This study presents a new data hiding mechanism that hides file information in text cover messages to safeguard user data from vulnerabilities. It also utilize a deduplication strategy that employs the suggested DSHA algorithm to reduce repeated data storage. This novel technique ensures security while maintaining confidentiality.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Morkel, T., Eloff, J. H., and Olivier, M. S, “An Overview of Image Steganographyâ€, In ISSA, Vol. 1, No. 2, 2005.
Arya, A., and Soni, S, “A Literature Review on Various Recent Steganography Techniquesâ€, International Journal on Future Revolution in Computer Science & Communication Engineering, ISSN: 2454-4248 Vol. 4 Issue: 1,2018.
Alwahbani, Samah, and Elshoush, Huwaida, “Hybrid Audio Steganography and Cryptography Method Based on High Least Significant Bit (LSB) Layers and One-Time Pad—A Novel Approachâ€, PP. 431-453, 10.1007/978-3-319-69266-1_21,2018,
Dr. Rajkumar L Biradar and Ambika Umashetty , â€A Survey Paper on Steganography Techniquesâ€, International Journal of Innovative Research in Computer and Communication Engineering ,Vol. 4, Issue 1, January 2016
Khairullah, M. A novel steganography method using transliteration of Bengali text. J. King Saud Univ.-Comput. Inf. Sci. 2019, 31, 348–366.
Yang, Z.; Xiang, L.; Zhang, S.; Sun, X.; Huang, Y. Linguistic generative steganography with enhanced cognitive-imperceptibility. IEEE Signal. Process. Lett. 2021, 28, 409–413.
Allah Ditta, Muhammad Azeem, Shahid Naseem, Khurram Gulzar Rana, Muhammad Adnan Khan, Zafar Iqbal,â€A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using Unicodeâ€,Journal of King Saud University - Computer and Information Sciences,2020.
Behrooz Khosravi, Behnam Khosravi, Bahman Khosravi, Khashayar Nazarkardeh, A new method for pdf steganography in justified texts, Journal of Information Security and Applications, Volume 45,2019, Pages 61-70, ISSN 2214-2126, https://doi.org/10.1016/j.jisa.2019.01.003.
Sadié, Juvet K., Leonel Moyou Metcheka, and René Ndoundam. "Two high capacity text steganography schemes based on color coding." arXiv preprint arXiv:2004.00948 (2020).
J. Hiney, T. Dakve, K. Szczypiorski and K. Gaj, "Using Facebook for Image Steganography," 2015 10th International Conference on Availability, Reliability and Security, 2015, pp. 442-447, doi: 10.1109/ARES.2015.20.
M. Jain and S. K. Lenka, "Secret data transmission using vital image steganography over transposition cipher," 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, pp.1026-1029, doi: 10.1109/ICGCIoT.2015.7380614.
Neetha Francis, 2015, Information Security using Cryptography and Steganography, 53 (IJERT) NSRCL – 2015 (Volume 3 – Issue 28).
Z. Yan, W. Ding, X. Yu, H. Zhu and R. H. Deng, "Deduplication on Encrypted Big Data in Cloud," in IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, June 1 2016.
Xu, J., Chang, E.C., Zhou, J.: Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In: 8th ACM SIGSAC Symposium, pp. 195–206,2011.