Novel Approaches to Text Steganography
Journal: International Journal of Scientific Engineering and Science (Vol.3, No. 11)Publication Date: 2019-15-12
Authors : Tanmay Bhagwat Saurav Kanchan;
Page : 8-10
Keywords : ASCII; cryptography; data hiding; decryption; encryption; RSA algorithm; steganography; text steganography;
Abstract
Current techniques of steganography are not impervious to detection using thorough procedures. This paper proposes to ascertain security and precision in the process of Text Steganography by presenting a few unexplored techniques. It establishes reliable media to transfer any required message accompanied by hidden data. The process relies on RSA Algorithm to encrypt user data by generating subtle imperfections in the appearance or layout of the characters included in the memo. The message undergoes multilevel encryption and corresponding decryption using both the public and private keys, thus bearing invulnerability to cyber-attacks and security breaches. The receiver acquires the modified message in the sender's format, to fend off digital decryption from unauthorized users. As opposed to contemporary techniques of Text Steganography, the encrypted message has a relative constraint on the size as it depends on the size of the data to be hidden, bearing no definite restrictions on the amount of information to be conveyed.
Other Latest Articles
- Alternative Analysis of Type B Terminal Locations in Bone Bolango Regency, Gorontalo Province: Application of AHP
- ASSESSMENT OF ATTITUDE OF MARRIED MALES REGARDING VASECTOMY IN RURAL AND URBAN AREAS OF CHANDIGARH
- Http://ijses.com/wp-content/uploads/2019/11/19-IJSES-V3N10.pdf
- HOW TO BE RISK-FREE IN DOING ONLINE TRANSACTIONS
- Enhance Land Support Layer Road Pavement Subgrade Soil Plant Stability Based on Geotextile
Last modified: 2020-03-18 15:58:43