Information hiding through dynamic text steganography and cryptography

Computing and informatics

Deepali Bhat, V. Krithi, K. N. Manjunath, Srikanth Prabhu, A. Renuka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Over the last decade, there has been a constant increase in the accessibility and utility of the Internet. More number of people are tending towards the use of mobile applications, E-mails, E-commerce and social networking sites. In this scenario, even the most confidential information travels through unsecured channels. Hence, it becomes crucial to ensure the security of the data being exchanged. This paper explores an efficient method of secure data transmission through information hiding which includes text steganography and cryptography. The proposed methodology was built on top of the result of the Data Encryption Standard (DES), a symmetric key algorithm used for cryptography. The concept of data hiding is realized using text steganography i.e. a secret message is concealed within another text. The text used to hide the sensitive information was constructed dynamically and did not reveal the presence of any secret data. It can be concluded that the combination of these two cryptographic techniques provides an efficient solution for information hiding and data transmission through unsecured channels.

Original languageEnglish
Title of host publication2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1826-1831
Number of pages6
Volume2017-January
ISBN (Electronic)9781509063673
DOIs
Publication statusPublished - 30-11-2017
Event2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017 - Manipal, Mangalore, India
Duration: 13-09-201716-09-2017

Conference

Conference2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
CountryIndia
CityManipal, Mangalore
Period13-09-1716-09-17

Fingerprint

Steganography
Cryptography
Data communication systems
Electronic commerce
Electronic mail
Internet

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Cite this

Bhat, D., Krithi, V., Manjunath, K. N., Prabhu, S., & Renuka, A. (2017). Information hiding through dynamic text steganography and cryptography: Computing and informatics. In 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017 (Vol. 2017-January, pp. 1826-1831). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICACCI.2017.8126110
Bhat, Deepali ; Krithi, V. ; Manjunath, K. N. ; Prabhu, Srikanth ; Renuka, A. / Information hiding through dynamic text steganography and cryptography : Computing and informatics. 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Vol. 2017-January Institute of Electrical and Electronics Engineers Inc., 2017. pp. 1826-1831
@inproceedings{32e6989ed76146c4a9dc995f4789937a,
title = "Information hiding through dynamic text steganography and cryptography: Computing and informatics",
abstract = "Over the last decade, there has been a constant increase in the accessibility and utility of the Internet. More number of people are tending towards the use of mobile applications, E-mails, E-commerce and social networking sites. In this scenario, even the most confidential information travels through unsecured channels. Hence, it becomes crucial to ensure the security of the data being exchanged. This paper explores an efficient method of secure data transmission through information hiding which includes text steganography and cryptography. The proposed methodology was built on top of the result of the Data Encryption Standard (DES), a symmetric key algorithm used for cryptography. The concept of data hiding is realized using text steganography i.e. a secret message is concealed within another text. The text used to hide the sensitive information was constructed dynamically and did not reveal the presence of any secret data. It can be concluded that the combination of these two cryptographic techniques provides an efficient solution for information hiding and data transmission through unsecured channels.",
author = "Deepali Bhat and V. Krithi and Manjunath, {K. N.} and Srikanth Prabhu and A. Renuka",
year = "2017",
month = "11",
day = "30",
doi = "10.1109/ICACCI.2017.8126110",
language = "English",
volume = "2017-January",
pages = "1826--1831",
booktitle = "2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Bhat, D, Krithi, V, Manjunath, KN, Prabhu, S & Renuka, A 2017, Information hiding through dynamic text steganography and cryptography: Computing and informatics. in 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. vol. 2017-January, Institute of Electrical and Electronics Engineers Inc., pp. 1826-1831, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017, Manipal, Mangalore, India, 13-09-17. https://doi.org/10.1109/ICACCI.2017.8126110

Information hiding through dynamic text steganography and cryptography : Computing and informatics. / Bhat, Deepali; Krithi, V.; Manjunath, K. N.; Prabhu, Srikanth; Renuka, A.

2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Vol. 2017-January Institute of Electrical and Electronics Engineers Inc., 2017. p. 1826-1831.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Information hiding through dynamic text steganography and cryptography

T2 - Computing and informatics

AU - Bhat, Deepali

AU - Krithi, V.

AU - Manjunath, K. N.

AU - Prabhu, Srikanth

AU - Renuka, A.

PY - 2017/11/30

Y1 - 2017/11/30

N2 - Over the last decade, there has been a constant increase in the accessibility and utility of the Internet. More number of people are tending towards the use of mobile applications, E-mails, E-commerce and social networking sites. In this scenario, even the most confidential information travels through unsecured channels. Hence, it becomes crucial to ensure the security of the data being exchanged. This paper explores an efficient method of secure data transmission through information hiding which includes text steganography and cryptography. The proposed methodology was built on top of the result of the Data Encryption Standard (DES), a symmetric key algorithm used for cryptography. The concept of data hiding is realized using text steganography i.e. a secret message is concealed within another text. The text used to hide the sensitive information was constructed dynamically and did not reveal the presence of any secret data. It can be concluded that the combination of these two cryptographic techniques provides an efficient solution for information hiding and data transmission through unsecured channels.

AB - Over the last decade, there has been a constant increase in the accessibility and utility of the Internet. More number of people are tending towards the use of mobile applications, E-mails, E-commerce and social networking sites. In this scenario, even the most confidential information travels through unsecured channels. Hence, it becomes crucial to ensure the security of the data being exchanged. This paper explores an efficient method of secure data transmission through information hiding which includes text steganography and cryptography. The proposed methodology was built on top of the result of the Data Encryption Standard (DES), a symmetric key algorithm used for cryptography. The concept of data hiding is realized using text steganography i.e. a secret message is concealed within another text. The text used to hide the sensitive information was constructed dynamically and did not reveal the presence of any secret data. It can be concluded that the combination of these two cryptographic techniques provides an efficient solution for information hiding and data transmission through unsecured channels.

UR - http://www.scopus.com/inward/record.url?scp=85042659664&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85042659664&partnerID=8YFLogxK

U2 - 10.1109/ICACCI.2017.8126110

DO - 10.1109/ICACCI.2017.8126110

M3 - Conference contribution

VL - 2017-January

SP - 1826

EP - 1831

BT - 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Bhat D, Krithi V, Manjunath KN, Prabhu S, Renuka A. Information hiding through dynamic text steganography and cryptography: Computing and informatics. In 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Vol. 2017-January. Institute of Electrical and Electronics Engineers Inc. 2017. p. 1826-1831 https://doi.org/10.1109/ICACCI.2017.8126110