A Vision on Text Steganography with proper Investigation Report to Identify the Associated Problem

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-54 Number-1
Year of Publication : 2017
Authors : Rajeev Gupta, Dr. Vivek Sharma
DOI :  10.14445/22312803/IJCTT-V54P108

MLA

Rajeev Gupta, Dr. Vivek Sharma "A Vision on Text Steganography with proper Investigation Report to Identify the Associated Problem". International Journal of Computer Trends and Technology (IJCTT) V54(1):35-39, December 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Security is one of the major issues now days. As we are moving towards modern technologies, risk on our confidential information also increases rapidly. Today’s, all of us are very much dependent on digital world. Communications, Entertainment, Data Storage, Business and Banking all are part of our daily life in digital world. To aim at all, there is a need to upgrade or construct new security algorithms or design such that it should be efficient to cope up with latest modern technologies and parallel enough secure against latest attack. Many researchers have done their research in the same field and presents there solutions that can give better results of the above discussed problem. There are many type of security; this paper strictly focused on confidentiality and discussed all those solutions after doing deep inspection on it.

References
[1] Md. Palash Uddin, Mousumi Saha, Syeda Jannatul Ferdousi, Masud Ibn Afjal, Md. Abu Marjan, “Developing an Efficient Solution to Information Hiding through Text Steganography along with Cryptography” The 9th International Forum on Strategic Technology (IFOST), October 21-23, 2014, Cox?s Bazar, Bangladesh, IEEE.
[2] Xing Tang, Mingsong Chen, “Design And Implementation Of Information Hiding System Based On RGB”, 2013 IEEE.
[3] Rishav Ray, Jeeyan Sanyal, Debanjan Das, Asoke Nath. “A new Challenge of hiding any encrypted secret message inside any Text/ASCII file or in MS word file: RJDA Algorithm”. 2012 IEEE International Conference on Communication Systems and Network Technologies.
[4] C. K Mulunda, P. W .Wagacha and A. O. Adede, Genetic Algorithm Based Model in Text Steganography, The African Journal of Information Systems, Vol. 2 Issue 5, pp. 131-144, October 2013.
[5] An Integrated Symmetric key Cryptography Algorithm using Generalised modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm : Debanjan Das, Joyshree Nath, Megholova Mukherjee, Neha Choudhary, Asoke Nath: Communicated for publication in IEEE International conference WICT 2011 to be held at Mumbai Dec 11-14, 2011.
[6] M.K Ramaiya, N.Hemrajani, A.K Saxena. “Security improvisation in image steganography using DES” IEEE 3rd International on Advance Computing Conference (IACC), Publication Year: 2013, Page(s): 1094 – 1099.
[7] V. Saravanan, A. Neeraja, “Security Issues in Computer Networks and Stegnography”, Proceedings of7`h International Conference on Intelligent Systems and Control (ISCO 2013).
[8] Amitava Nag, Saswati Ghosh, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar “An Image Steganography Technique using X-Box Mapping” IEEEInternational Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012.
[9] Thomas Leontin Philjon and Venkateshvara Rao. “Metamorphic Cryptography - A Paradox between Cryptography and Steganography Using Dynamic Encryption” IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011.
[10] Debanjan Das, Megholova Mukherjee, Neha Choudhary, Asoke Nath, “An Integrated Symmetric key Cryptography Algorithm using Generalised modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm” World Congress on Information and Communication Technologies-20110.
[11] Akhil Kaushik, AnantKumar and Manoj Bamela “ Block Encryption Standard for Transfer of Data “ IEEE International Conference on Networking and Information Technology 2010.
[12] Neeraj Khanna, Joyshree Nath, Joel James, Amlan Chakrabarti, Sayantan Chakraborty, Asoke Nath, “New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm”, IEEE-2011.
[13] RigDas and Themrichon Tuithung ”A Novel Steganography Method for Image Based on Huffman Encoding” IEEE 2012.
[14] R.P Kumar, V. Hemanth, M “Securing Information Using Sterganoraphy” International Conference on Circuits, Power and Computing Technologies (ICCPCT), Publication Year: 2013 , Page(s): 1197 – 1200.
[15] G Prabakaran, R. Bhavani, P.S. Rajeswari, “Multi secure and robustness for medical image based steganography scheme” International Conference on Circuits, Power and Computing Technologies (ICCPCT), Publication Year: 2013 , Page(s): 1188 – 1193.
[16] Rengarajan Amirtharajan, Anushiadevi, Meena, Kalpana and John Bosco Balaguru “Seeable Visual But Not Sure of It” IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM - 2012) March 30, 31, 2012.
[17] L.Jani Anbarasi and S.Kannan “Secured Secret Color Image Sharing With Steganography” IEEE 2012.
[18] G.Karthigai Seivi, Leon Mariadhasan, K. L. Shunmuganathan “Steganography Using Edge Adaptive Image” IEEE International Conference on Computing, Electronics and Electrical Technologies [ICCEET] 2012.
[19] AmrM. Riad, Amr H. Hussein and AtefAbou EI-Azm “A New Selective Image Encryption Approach using Hybrid Chaos and Block Cipher ”The 8th International Conference on INFOrmatics and Systems (INFOS2012) - 14-16 May Computational Intelligence and Multimedia Computing Track.
[20] Arun Raj R, Sudhish N George and Deepthi P. P. “An Expeditious Chaos Based Digital Image Encryption Algorithm” 1st Int?l Conf. on Recent Advances in Information Technology | RAIT-2012.
[21] Rithmi Mitter and M. Sridevi Sathya Priya “a highly secure cryptosystem for image encryption” IEEE Conferences 2012.
[22] Somdip Dey, Kalyan Mondal, Joyshree Nath, Asoke Nath “Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm” I.J.Modern Education and Computer Science, 2012, 6, 59-67.
[23] S.Premkumar, A.E.Narayanan “Steganography Scheme Using More Surrounding Pixels combined with Visual Cryptography for Secure Application ”International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012.
[24] Abhishek Gupta, Sandeep Mahapatra and, Karanveer Singh “ Data Hiding in Color Image Using Cryptography with Help of ASK Algorithm” 2011 IEEE.
[25] Ashwak M. AL-Abiachi, Faudziah Ahmad and Ku Ruhana “A Competitive Study of Cryptography Techniques over Block Cipher” UKSim 13th IEEE International Conference on Modelling and Simulation 2011.
[26] Anderson, R. J., and F.A.P. Petitcolas. 1998. “On The Limits of Steganography”. IEEE Journal of Selected Areas in Communications. 16(4): 474-481
[27] B. Schneier, Applied Cryptography, John Wiley & Sons, New York, 1994.
[28] B. Schneier, "Data Guardians," MacWorld, Feb 1993, 145-151.
[29] William stallings, “Cryptography and Network Security:Principles & Practices”, second edition. http://en.wikipedia.org/wiki/Peak_signal-to-noise_ ratio

Keywords
Computer Security, Steganography, MSA Algorithm, Encryption Decryption Algorithm