BibTex RIS Cite

New Approach in E-mail Based Text Steganography

Year 2015, Volume: 3 Issue: 2, 54 - 57, 01.04.2015
https://doi.org/10.18201/ijisae.05687

Abstract

In this study combination of lossless compression techniques and Vigenere cipher was used in text steganography that makes use of email addresses to be the keys to reconstruct the secret message which has been embedded into the email text. After selecting the cover text that has highest repetition pattern regarding to the secret message the distance matrix was formed. The members of distance matrix were compressed by following lossless compression algorithms as in written sequence; Run Length Encoding (RLE) + Burrows Wheeler Transform (BWT) + Move to Forward (MTF) + Run Length Encoding + Arithmetic Encoding (AE).  Later on  Latin Square was used to form stego key 1and then Vigenere table was used to increase complexity of extracting stego key 1. Final step was to choose e-mail addresses by using stego key 1 and stego key 2to embed secret message into forward e-mail platform. The experimental results showed that proposed method has reasonable performance with high complexity.

References

  • E. Satir and H. Isik, A compression-based text steganography method, The Journal of Systems and Software Science Direct, vol. 85, issue 10, pp. 2385-2394, 2012.
  • E. Satir and H. Isik, A Huffman Compression based Text
  • Steganography Method, Multimedia Tools Appl, September 2012.
  • Tohari Ahmad, Melvin S. Z. Marbun, Hudan Studiawan, Waskitho Wibisono, and Royyana M. Ijtihadie, A Novel Random Email-Based Steganography International Journal of e-Education, e-Business, e-Management and e-Learning, Vol. 4, No. 2, April 2014
  • Rajeev Kumar , Satish Chand , and Samayveer Singh, An Email based high capacity text steganography scheme using combinatorial compression, 25th International Conference- Confluence The Next Generation Information Technology Summit (Confluence), 25-26 September 2014, India
  • Z. Wang, T. Kieu, C. Chang, and M. Li, Emoticon-based text steganography, in Proc. 2009 Asia-Pacific Conference on Computational, Wuhan, China, 2009.
  • P. Wayner, Mimic Functions, Cryptologia vol. 16(3), pp. 193-214, 1992.
  • P. Wayner, Disappearing Cryptography, AP Professional, Chestnut Hill, MA (1996).
  • L. Por, K. Wong, and K. Chee, UniSpaCh: a text based data hiding method using unicode space characters, Journal of Systems and Software, vol. 85, issue 5, pp. 1075-1082, 2012.
  • M. Topkara, U. Topkara, and M. Atallah, Information hiding through errors: a confusing approach, in Proc. SPIE International Conference on Security,Steganography, and Watermarking of Multimedia Contents, San Jose, CA, 2007
  • A. Desoky, Listega: list-based steganography methodology, International Journal of Information Security, vol. 8, no. 4, pp. 247-261, 2009.
  • K. Maher, TEXTO. 1995. ftp://ftp.funet.fi/pub/crypt/steganography/texto.tar.gz.
  • K. Winstein, “Lexical steganography through adaptive modulation of the word choice hash”, Secondary education at the Illinois Mathematics and Science Academy, January 1999.
  • H. Nakagawa, K. Sanpei, T. Matsumoto, T. Kashiwagi, S. Kawaguchi, K. Makino and I. Murase, “Meaning Preserving Information Hiding _Japanese text Case,” IPSJ Journal, Vol.42, No.9, pp. 2339 - 2350, 2001. (In Japanese)
  • B. Murphy and C. Vogel, The syntax of concealment: reliable methods for plain text information hiding, In Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, vol. 65(05), 2007.
  • A. Desoky, Listega: List-Based Steganography Methodology, International Journal of Information Security, Springer-Verlag, vol. 8, pp. 247-261, April 2009.
Year 2015, Volume: 3 Issue: 2, 54 - 57, 01.04.2015
https://doi.org/10.18201/ijisae.05687

Abstract

References

  • E. Satir and H. Isik, A compression-based text steganography method, The Journal of Systems and Software Science Direct, vol. 85, issue 10, pp. 2385-2394, 2012.
  • E. Satir and H. Isik, A Huffman Compression based Text
  • Steganography Method, Multimedia Tools Appl, September 2012.
  • Tohari Ahmad, Melvin S. Z. Marbun, Hudan Studiawan, Waskitho Wibisono, and Royyana M. Ijtihadie, A Novel Random Email-Based Steganography International Journal of e-Education, e-Business, e-Management and e-Learning, Vol. 4, No. 2, April 2014
  • Rajeev Kumar , Satish Chand , and Samayveer Singh, An Email based high capacity text steganography scheme using combinatorial compression, 25th International Conference- Confluence The Next Generation Information Technology Summit (Confluence), 25-26 September 2014, India
  • Z. Wang, T. Kieu, C. Chang, and M. Li, Emoticon-based text steganography, in Proc. 2009 Asia-Pacific Conference on Computational, Wuhan, China, 2009.
  • P. Wayner, Mimic Functions, Cryptologia vol. 16(3), pp. 193-214, 1992.
  • P. Wayner, Disappearing Cryptography, AP Professional, Chestnut Hill, MA (1996).
  • L. Por, K. Wong, and K. Chee, UniSpaCh: a text based data hiding method using unicode space characters, Journal of Systems and Software, vol. 85, issue 5, pp. 1075-1082, 2012.
  • M. Topkara, U. Topkara, and M. Atallah, Information hiding through errors: a confusing approach, in Proc. SPIE International Conference on Security,Steganography, and Watermarking of Multimedia Contents, San Jose, CA, 2007
  • A. Desoky, Listega: list-based steganography methodology, International Journal of Information Security, vol. 8, no. 4, pp. 247-261, 2009.
  • K. Maher, TEXTO. 1995. ftp://ftp.funet.fi/pub/crypt/steganography/texto.tar.gz.
  • K. Winstein, “Lexical steganography through adaptive modulation of the word choice hash”, Secondary education at the Illinois Mathematics and Science Academy, January 1999.
  • H. Nakagawa, K. Sanpei, T. Matsumoto, T. Kashiwagi, S. Kawaguchi, K. Makino and I. Murase, “Meaning Preserving Information Hiding _Japanese text Case,” IPSJ Journal, Vol.42, No.9, pp. 2339 - 2350, 2001. (In Japanese)
  • B. Murphy and C. Vogel, The syntax of concealment: reliable methods for plain text information hiding, In Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, vol. 65(05), 2007.
  • A. Desoky, Listega: List-Based Steganography Methodology, International Journal of Information Security, Springer-Verlag, vol. 8, pp. 247-261, April 2009.
There are 16 citations in total.

Details

Primary Language English
Journal Section Research Article
Authors

Kemal Tutuncu

Abdikarim Abi Hassan This is me

Publication Date April 1, 2015
Published in Issue Year 2015 Volume: 3 Issue: 2

Cite

APA Tutuncu, K., & Hassan, A. A. (2015). New Approach in E-mail Based Text Steganography. International Journal of Intelligent Systems and Applications in Engineering, 3(2), 54-57. https://doi.org/10.18201/ijisae.05687
AMA Tutuncu K, Hassan AA. New Approach in E-mail Based Text Steganography. International Journal of Intelligent Systems and Applications in Engineering. April 2015;3(2):54-57. doi:10.18201/ijisae.05687
Chicago Tutuncu, Kemal, and Abdikarim Abi Hassan. “New Approach in E-Mail Based Text Steganography”. International Journal of Intelligent Systems and Applications in Engineering 3, no. 2 (April 2015): 54-57. https://doi.org/10.18201/ijisae.05687.
EndNote Tutuncu K, Hassan AA (April 1, 2015) New Approach in E-mail Based Text Steganography. International Journal of Intelligent Systems and Applications in Engineering 3 2 54–57.
IEEE K. Tutuncu and A. A. Hassan, “New Approach in E-mail Based Text Steganography”, International Journal of Intelligent Systems and Applications in Engineering, vol. 3, no. 2, pp. 54–57, 2015, doi: 10.18201/ijisae.05687.
ISNAD Tutuncu, Kemal - Hassan, Abdikarim Abi. “New Approach in E-Mail Based Text Steganography”. International Journal of Intelligent Systems and Applications in Engineering 3/2 (April 2015), 54-57. https://doi.org/10.18201/ijisae.05687.
JAMA Tutuncu K, Hassan AA. New Approach in E-mail Based Text Steganography. International Journal of Intelligent Systems and Applications in Engineering. 2015;3:54–57.
MLA Tutuncu, Kemal and Abdikarim Abi Hassan. “New Approach in E-Mail Based Text Steganography”. International Journal of Intelligent Systems and Applications in Engineering, vol. 3, no. 2, 2015, pp. 54-57, doi:10.18201/ijisae.05687.
Vancouver Tutuncu K, Hassan AA. New Approach in E-mail Based Text Steganography. International Journal of Intelligent Systems and Applications in Engineering. 2015;3(2):54-7.