A Novel Approach for Hiding Information into Mathematical Expression
Abstract
Information hiding has received a lot of attention recently. Various methods have been developed for steganography, and at the same time, proper steganalysis has been designed to detect hidden data. However, an approach that is introduced in a new type of cover can be less doubtful due to the lack of attention to steganalysis analyses. This paper proposes a method that can convert a message into a mathematical expression. The generated mathematical expression can be used as a cover to transmit the message along with a highly secure text. The proposed method, using a suitable stochastic grammar, has the ability to create a mathematical expression based on a given text. Probability of grammar rules can be determined in accordance with the carrier text and based on the type of mathematical expressions.
Keywords
References
- Gupta, B.B., D. Agrawal, and S. Yamaguchi. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. New York: IGI Global, 2016.
- Bhattacharyya, S., I. Banerjee, and G. Sanyal. "A novel approach of secure text based steganography model using word mapping method (WMM)." International Journal of Computer and Information Engineering, 2010: Vol. 4, No. 2, pp.96–103.
- Lockwood, Robert, and Curran Kevin. "Text based steganography." International Journal of Information Privacy, Security and Integrity 3-2 (2017): 134-153.
- Li, J., C. YU, B.B. Gupta, and X. Ren. "Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition." Multimedia Tools and Applications, 1027: 1–17.
- Balaji, R., and Naveen Garewal. "Secure data transmission using video Steganography."IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY. 2011.
- Nikam, G., A. Gupta, V. Kalal, and P. Waghmare. "A Survey of Video Steganography Techniques." Journal of Network Communications and Emerging Technologies (JNCET), 2017: 33-35.
- Cuttnel, J.D., and K.W. Johnson. Physics, 4th ed., Wiley, New York. 4th. New York: Wiley, 1998.
- Mishra, Shilpi, Yadav Virendra Kumar, Trivedi Munesh Chand, and ShrimaliTarun. "Audio Steganography Techniques: A Survey." Advances in Computer and Computational Sciences. Springer, 2018: 581-589.
Details
Primary Language
English
Subjects
Engineering
Journal Section
Research Article
Authors
Muhammed Milani
*
0000-0003-2450-0280
Türkiye
Publication Date
December 30, 2020
Submission Date
October 18, 2019
Acceptance Date
June 22, 2020
Published in Issue
Year 2020 Volume: 7 Number: 2