Fig 6 - uploaded by Dr- Indradip Banerjee
Content may be subject to copyright.
Proposed Text Steganography Model 

Proposed Text Steganography Model 

Source publication
Article
Full-text available
Encrypted messages sending frequently draws the attention of third parties, perhaps causing attempts to break and reveal the original messages. Steganography is introduced to hide the existence of the communication by concealing a secret message in an appropriate carrier like text, image, audio or video. Quantum steganography where the sender (Alic...

Context in source publication

Context 1
... THE PROPOSED MODEL Figure 6 shows the block diagram of the proposed secretkey text steganographic model. The input messages can be in any digital form and are often treated as a bit stream. ...

Similar publications

Article
Full-text available
Prevalent current day scenario with the predominant accelerated utilisation of the internet, is witnessing the increased interest in the method of transmitting concealed secret information (information hiding) via several variant techniques. One of the eminent and significant form of information hiding is Steganography. Hence, Steganography involve...

Citations

... There are different methods to hide a secret message in a text. Some of the most popular are formatbased mechanisms, random and statistical formation, and linguistic techniques [5]. ...
... Below figure ( various techniques like Image, Audio, Video, Text etc. Text Steganography have various categories [4] like Format related, random generation, statistical, Linguistic and some technique on Quantum Approach [5]. ...
... Steganography have various techniques. Text Steganography[6]has the categories like Format-based, random & statistical generation, Linguistic methods and Quantum Approach[7]. In audio Steganography[8], messages are embedded into digitized audio signal which result slight alteration of binary sequence of the corresponding audio file. ...
... In this method the length of the stego and the cover are same so prediction of existence of message is difficult in view of that characteristics, so this one is the unique method which has been developed in this steganography approach. The proposed scheme has been enthused by the author's previous work [11], [12], [13], [14], [15], [16], [17], [18] on various approaches of steganography methods. The quantum truth table approach has been incorporated from previous work [18] and The Revised SSCE Value incorporated from SSCE value in [11], [12], [18]. ...
... The proposed scheme has been enthused by the author's previous work [11], [12], [13], [14], [15], [16], [17], [18] on various approaches of steganography methods. The quantum truth table approach has been incorporated from previous work [18] and The Revised SSCE Value incorporated from SSCE value in [11], [12], [18]. This paper is organized into the following sections. ...
... The proposed scheme has been enthused by the author's previous work [11], [12], [13], [14], [15], [16], [17], [18] on various approaches of steganography methods. The quantum truth table approach has been incorporated from previous work [18] and The Revised SSCE Value incorporated from SSCE value in [11], [12], [18]. This paper is organized into the following sections. ...
Article
Full-text available
In this contribution we present a work of text steganography. Maintain the security of the secret information has been a great challenge in our day to day life. Sender can send messages habitually through a communication channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography is a talented province which is used for secured data transmission over any public media. Extensive amount of research work has been established by different researchers on steganography. In this paper, a text steganography procedure has been designed with the help of a Regional language of India i.e. Gujarati language. Here the quantum approach also incorporates for increasing the security level. A Revised SSCE code (SSCE - Secret Steganography Code for Embedding) has been implemented in this work to upgrade the level of security. Text steganography together with Revised SSCE code & quantum approach based on the use of two specific and two special characters in Gujarati language and mapping technique of quantum gate truth table have been used.
... In this method the length of the stego and the cover are same so prediction of existence of message is difficult in view of that characteristics, so this one is the unique method which has been developed in this steganography approach. The proposed scheme has been enthused by the author's previous work [11], [12], [13], [14], [15], [16], [17], [18] on various approaches of steganography methods. The quantum truth table approach has been incorporated from previous work [18]. ...
... The proposed scheme has been enthused by the author's previous work [11], [12], [13], [14], [15], [16], [17], [18] on various approaches of steganography methods. The quantum truth table approach has been incorporated from previous work [18]. This paper is organized into the following sections. ...
Article
Full-text available
In this paper we present a work of text steganography. Now a days, maintain the security of the secret information has been a great challenge. Sender can send messages habitually through a communication channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography is a promising region which is used for secured data transmission over any public media. Substantial amount of research work has been accepted by different researchers on steganography. In this paper, a text steganography procedure has been planned with the help of an Indian regional language i.e. Oriya language. Text steganography together with quantum approach based on the use of two specific characters and two special characters like invited comas (opening and closing) in Oriya language and mapping technique of quantum gate truth table have been used.
... The proposed scheme has been enthused by the author's previous work [14]- [22] on various approaches of steganography methods. The quantum truth table approach has been incorporated from previous work [22]. ...
... The proposed scheme has been enthused by the author's previous work [14]- [22] on various approaches of steganography methods. The quantum truth table approach has been incorporated from previous work [22]. This paper is organized into the following sections. ...
Chapter
Full-text available
Steganography maintain the security of the secret data through a communication channel, which causing attempts to break and reveal the original messages. In this paper, a text steganography technique has been proposed with the help of Bengali language. Text steganography including quantum approach based on the use of two specific characters and two special characters like invited comas (opening and closing) in Bengali language and mapping technique of quantum gate truth table have been used.
Article
Full-text available
Maintain the security of the secret informat ion", this words has been a great challenge in our day to day life. Sender can send messages regularly through a co mmunicat ion channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography is a gifted region which is used for secured data transmission over any public med ia. Wide quantity of research work has been established by different researchers on steganography. Steganalysis is an art and science of detecting messages hidden using steganography. Some research work has also been remarked in the field of Steganalysis also. In this contribution, we have gone through steganalysis attack of some established text steganography tools.