Full Paper View Go Back
Encoding of Hindi Text Using Steganography Technique
Rajesh Shah1 , Yashwant Singh Chouhan2
Section:Research Paper, Product Type: Isroset-Journal
Vol.2 ,
Issue.1 , pp.22-28, Jan-2014
Online published on Feb 28, 2014
Copyright © Rajesh Shah , Yashwant Singh Chouhan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Rajesh Shah , Yashwant Singh Chouhan, “Encoding of Hindi Text Using Steganography Technique,” International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.1, pp.22-28, 2014.
MLA Style Citation: Rajesh Shah , Yashwant Singh Chouhan "Encoding of Hindi Text Using Steganography Technique." International Journal of Scientific Research in Computer Science and Engineering 2.1 (2014): 22-28.
APA Style Citation: Rajesh Shah , Yashwant Singh Chouhan, (2014). Encoding of Hindi Text Using Steganography Technique. International Journal of Scientific Research in Computer Science and Engineering, 2(1), 22-28.
BibTex Style Citation:
@article{Shah_2014,
author = {Rajesh Shah , Yashwant Singh Chouhan},
title = {Encoding of Hindi Text Using Steganography Technique},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {1 2014},
volume = {2},
Issue = {1},
month = {1},
year = {2014},
issn = {2347-2693},
pages = {22-28},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=131},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=131
TI - Encoding of Hindi Text Using Steganography Technique
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Rajesh Shah , Yashwant Singh Chouhan
PY - 2014
DA - 2014/02/28
PB - IJCSE, Indore, INDIA
SP - 22-28
IS - 1
VL - 2
SN - 2347-2693
ER -
Abstract :
Establishing hidden communication and conveying information secretly has been of interest since long past ago. One of the method introduce for establishing hidden communication is Steganography. Methods of Steganography have been mostly applied on image, audio, videos and text files while the major characteristics of these methods are to change in the structure and features so as not to be identifiable by human users. Text document are the best example for this. In this paper we produce a new approach for Hindi text Steganography, which uses letter and its diacritics and numerical code. This method is very useful in Hindi Text and in all other similar Indian Languages.
Key-Words / Index Term :
Hindi Text, Cryptography, Steganography, Text Steganography, Text Watermarking, Feature Coding
References :
[1]. K. Bennett, "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text", Purdue University, CERIAS Tech. Report, 2004.
[2]. Ross J. Anderson and Fabien A.P. Petit colas, "On the limits of steganography," IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright& Privacy Protection, vol. 16 no. 4, pp 474-481, May1998.
[3]. Fabien A. P. Petit colas, Ross J. Anderson and Markus G.Kuhn. “Information Hiding – A Survey”, Proceedings of the IEEE,special issue on protection of multimedia content, July 1999, pp. 1062 – 1078.
[4]. N.F. Maxemchuk J.T. Brassil, S. Low and L. O.Gorman. Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communications, 13:1495–1504, 1995.
[5]. G. Doerr and J.L. Dugelay. Security pitfalls of frame by frame approaches to video watermarking. IEEET transactions on Signal Processing, Supplement on Secure Media, 52:2955–2964, 2004.
[6]. W. Sweldens. The lifting scheme. A construction of second generation wavelets. SIAM J. Math. Anal., 29:511–546, 1997.
[7]. N.F.Johnson. And S. Jajodia. Steganography: seeing the unseen. IEEE Computer, 16:26–34, 1998.
[8]. W. Sweldens R. Calderbank, I. Daubechies and B.L. Yeo. Wavelet transforms that map integers to integers. Appl. Comput. Harmon. Anal.,5:332–369, 1998.
[9]. K. Moon Y. Kim and I. Oh. A text watermarking algorithm based on word classification and inter-word space statistics. In Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR’03), pages 775–779, 2003.
[10]. K. Rabah, “Steganography-the art of hiding data,” Information Technology Journal, vol.3, pp. 245-269, 2004.
[11]. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol.35, pp. 313-336, 1996.
[12]. [12] M. H. S. Shahreza, and M. S. Shahreza, ”A new approach to Persian/Arabic text steganography,” In Proceedings of 5th IEEE/ACIS Int. Conf. on Computer and Information Science and 1st IEEE/ACIS Int. Workshop on Component-Based Software Engineering, Software Architecture and Reuse, 2006, pp. 310-315.
[13]. M. H. S. Shahreza, and M. S. Shahreza, ”A new synonym text steganography,” Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, 2006, pp. 1524-1526.
[14]. J. Cummins, P. Diskin, S. Lau, and R. Parlett, “Steganography and digital watermarking,” School of Computer Science, 2004, pp.1-24.
[15]. T. Y. Liu, and W. H. Tsai, “A new steganographic method for data hiding in Microsoft word documents by a change tracking technique,” IEEE Transactions on Information Forensics and Security, vol.2, no.1, pp. 24-30, 2007.
[16]. M. Khairullah, “A novel text steganography system in cricket match scorecard,” Int. Journal of Computer Applications, vol.21, pp. 43-47, 2011.
[17]. H. Kabetta, B. Y. Dwiandiyanta, and Suyoto, “Information hiding in CSS: a secure scheme text steganography using public key cryptosystem,” Int. Journal on Cryptography and Information Security, vol.1, pp. 13-22, 2011.
[18]. A Novel Approach of Secure Text Based Steganography Model using Word Mapping Method(WMM) Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal International Journal of Computer and Information Engineering 4:2 2010.
[19]. Kalavathi Alla, R. Siva Rama Prasad, "An Evolution of Hindi Text Steganography," citing, p.1577-1578, 2009Sixth International Conference on Information Technology: New Generations, 2009.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.