New Approach in E-mail Based Text Steganography

: In this study combination of lossless compression techniques and Vigenere cipher was used in the e-mail based text steganography. It makes use of email addresses to be the keys to embed/to extract the secret message into/from the email text (cover text). After selecting the cover text that has highest repetition pattern regarding to the secret message the distance matrix was formed. The members of distance matrix were compressed by following lossless compression algorithms as in written sequence; Run Length Encoding (RLE) + Burrows Wheeler Transform (BWT) + Move to Front (MTF) + Run Length Encoding (RLE) + Arithmetic Encoding (ARI). Later on Latin Square was used to form stego key 1and then Vigenere cipher was used to increase complexity of extracting stego key 1. Final step was to choose e-mail addresses by using stego key 1 (K1) and stego key 2 (K2) to embed secret message into forward email platform. The experimental results showed that proposed method has reasonable performance in terms of capacity and also higher security in terms of complexity.

___

[1] E. Satir and H. Isik, A compression-based text steganography method, The Journal of Systems and Software Science Direct, vol. 85, issue 10, pp. 2385-2394, 2012.

[2] E. Satir and H. Isik, A Huffman Compression based Text Steganography Method, Multimedia Tools Appl, September 2012.

[3] Tohari Ahmad, Melvin S. Z. Marbun, Hudan Studiawan, Waskitho Wibisono, and Royyana M. Ijtihadie, A Novel Random Email-Based Steganography International Journal of e-Education, e-Business, e-Management and e-Learning, Vol. 4, No. 2, April 2014

[4] Rajeev Kumar , Satish Chand , and Samayveer Singh, An Email based high capacity text steganography scheme using combinatorial compression, 25th International ConferenceConfluence The Next Generation Information Technology Summit (Confluence), 25-26 September 2014, India

[5] Z. Wang, T. Kieu, C. Chang, and M. Li, Emoticon-based text steganography, in Proc. 2009 Asia-Pacific Conference on Computational, Wuhan, China, 2009.

[6] P. Wayner, Mimic Functions, Cryptologia vol. 16(3), pp. 193-214, 1992.

[7] P. Wayner, Disappearing Cryptography, AP Professional, Chestnut Hill, MA (1996).

[8] L. Por, K. Wong, and K. Chee, UniSpaCh: a text based data hiding method using unicode space characters, Journal of Systems and Software, vol. 85, issue 5, pp. 1075-1082, 2012.

[9] M. Topkara, U. Topkara, and M. Atallah, Information hiding through errors: a confusing approach, in Proc. SPIE International Conference on Security,Steganography, and Watermarking of Multimedia Contents, San Jose, CA, 2007

[10] A. Desoky, Listega: list-based steganography methodology, International Journal of Information Security, vol. 8, no. 4, pp. 247-261, 2009.

[11] K. Maher, TEXTO. 1995. ftp://ftp.funet.fi/pub/crypt/steganography/texto.tar.gz. [12] K. Winstein, “Lexical steganography through adaptive modulation of the word choice hash”, Secondary education at the Illinois Mathematics and Science Academy, January 1999.

[13] H. Nakagawa, K. Sanpei, T. Matsumoto, T. Kashiwagi, S. Kawaguchi, K. Makino and I. Murase, “Meaning Preserving Information Hiding _Japanese text Case,” IPSJ Journal, Vol.42, No.9, pp. 2339 - 2350, 2001. (In Japanese)

[14] B. Murphy and C. Vogel, The syntax of concealment: reliable methods for plain text information hiding, In Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, vol. 65(05), 2007.

[15] A. Desoky, Listega: List-Bas ed Steganography Methodology, International Journal of Information Security, Springer-Verlag, vol. 8, pp. 247-261, April 2009.
International Journal of Intelligent Systems and Applications in Engineering-Cover
  • ISSN: 2147-6799
  • Başlangıç: 2013
  • Yayıncı: Ismail SARITAS
Sayıdaki Diğer Makaleler

Dependability Assessment of the Railway Signalling Systems Based on the Stochastic Petri Nets Analysis

Jaouad BOUDNAYA, Abdelhak MKHİDA, Badr Bououlid IDRİSSİ

Rainfall estimation for the south shore of the Mediterranean Sea using MSG infrared images

Mohsene A. TEBBI, Boualem HADDAD

Atmospheric and light-induced effects in nanostructured silicon deposited by capacitively and inductively-coupled plasma

Z. M. Saleh, G. Nogay, E. Ozkol, R. TURAN

New Approach in E-mail Based Text Steganography

KEMAL TÜTÜNCÜ, Abdikarim Abi HASSAN

Comparison among Feature Encoding Techniques for HIV-1 Protease Cleavage Specificity

Uğur TURHAL, MURAT GÖK, Aykut DURGUT

About a discussion ‘‘Development a new mutation operator to solve the Traveling Salesman Problem by aid of genetic algorithms'', by Murat Albayrak and Novruz Allahverdi, 2011. Expert System with Applications, 38; 3, pp. 1313–1320.

NOVRUZ ALLAHVERDİ

Particle Swarm Optimization Based Approach for Location Area Planning in Cellular Networks

Mays S. ALGEBARY, Issmail M. ELLABİB, Ahmed B. ELWHİSHİ

Performance Evaluation of Different Feature Extractors and Classifiers for Recognition of Human Faces with Low Resolution Images

Soodeh NİKAN, Majid AHMADİ

Grade prediction improved by regular and maximal association rules

Anca Loredana UDRİSTOİU, Stefan UDRİSTOİU

About a discussionDevelopment a new mutation operator to solve the Traveling Salesman Problem by aid of genetic algorithms'', by Murat Albayrak and Novruz Allahverdi, 2011. Expert System with Applications, 38; 3, pp. 1313 1320.

Novruz ALLAHVERDİ