ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Novel Approaches to Text Steganography

Journal: International Journal of Scientific Engineering and Science (Vol.3, No. 11)

Publication Date:

Authors : ;

Page : 8-10

Keywords : ASCII; cryptography; data hiding; decryption; encryption; RSA algorithm; steganography; text steganography;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Current techniques of steganography are not impervious to detection using thorough procedures. This paper proposes to ascertain security and precision in the process of Text Steganography by presenting a few unexplored techniques. It establishes reliable media to transfer any required message accompanied by hidden data. The process relies on RSA Algorithm to encrypt user data by generating subtle imperfections in the appearance or layout of the characters included in the memo. The message undergoes multilevel encryption and corresponding decryption using both the public and private keys, thus bearing invulnerability to cyber-attacks and security breaches. The receiver acquires the modified message in the sender's format, to fend off digital decryption from unauthorized users. As opposed to contemporary techniques of Text Steganography, the encrypted message has a relative constraint on the size as it depends on the size of the data to be hidden, bearing no definite restrictions on the amount of information to be conveyed.

Last modified: 2020-03-18 15:58:43