Information Security System Based on English and Myanmar Text Steganography

  • May Htet Ph.D. Student, Department of Computer Engineering and Information Technology, Mandalay Technological University, Mandalay (100/107), Myanmar
  • Khin Myo Thant Lecturer, Department of Computer Engineering and Information Technology, Mandalay Technological University, Mandalay (100/107), Myanmar
Keywords: Embedding Capacity, Information Hiding, Steganography, Text Steganography, Myanmar Text Steganography.

Abstract

Due to the growth in frequent exchange of digital data over public channel, information security plays an important role in daily part of communication. Hence, various techniques like steganography are applied in information security area for more efficient information security system. This paper proposes two new text steganographic approaches using two different languages which are based on Unicode standard for secure data transfer over the public channel. The main aim is to overcome the limited embedding capacity, suspiciousness, and data damaging effect due to modification of existing steganographic approaches. The first approach conceals a message, without degrading the cover, by using four specific characters of words of the English cover text. The second approach performs message hiding by using the three specific groups of characters of combined words in Myanmar cover text while maintaining the content of the cover. The structure and operation of the proposed approaches based on the idea of existing text steganographic technique: Hiding Data in Paragraph (HDPara) algorithm. In this work, an empirical comparison of the proposed approaches with HDPara approach is presented. According to the comparison results, the proposed approaches outperform the existing HDPara approach in terms of embedding capacity. 

References

[1] Adnan Abdul-Aziz Gutub, and Manal Mohammad Fattani. “A novel Arabic text steganography method using letter points and extensions”. World Academy of Science, Engineering and Technology, International Journal of Computer, Information, Systems and Control Engineering, vol. 1, pp.483-486, 2007.
[2] K.F. Rafat. “Enhanced text steganography in SMS,” in Proc. of the 2nd Int. Conf. Computer, Control and Communication, 2009, pp.1-6.
[3] K. Alla and R.S.R. Prasad. “An evolution of Hindi text steganography,” in Proceeding of the 6th International Conference on Information Technology: New Generations (ICIT09), 2009, pp.1577-1578.
[4] Shirali-Shahreza. “Text steganography by changing words spelling,” presented at the 10th International Conference Advanced Communication Technology, 2008 (ICACT 2008), 17-20 Feb. 2008.
[5] P. Megha. “A new approach for text steganography using Hindi numerical code”, International Journal of Computer Applications, vol. 1, 2010, pp. 56-59.
[6] Mujtaba S. Memon and S. Asadullah. “A novel text steganography technique to Arabic language using reverse Fatha”, Pak. j. eng. technol. sci. vol. 1, 2011, pp.106-113.
[7] S. Alameti et.al. “A new approach for steganography in Telugu texts by shifting inherent vowel signs”, International Journal of Engineering Science and Technology, vol. 2, 2010, pp. 7203-7214.
[8] A. Monika. “Text steganographic approaches: a comparison”, International journal of network security & its applications (IJNSA), vol.5, no.1, pp. 91-106, January 2013.
[9] M. Zin Maung and M. Yoshiki,, “A rule-based syllable segmentation of Myanmar text”, in Proc. IJCNLP-08 Workshop on NLP for Less Privileged Languages, January 2008, pp.51-58.
[10] H. Martin. Representing Myanmar in Unicode: details and examples version 3, SIL International and Payap University Linguistics Institute, Chiang Mai, Thailand, 2007, pp. 01-45.
[11] F. A. Haidari, A. Gutub, K. A. Kahsah, and J. Hamodi. “Improving security and capacity for Arabic text steganography using “kashida” extensions,” IEEE/ACS Int. Conf. on Computer Systems and Applications, 2009.
[12] S. D. Pandya, P. V. Virparia. “Testing various similarity metrics and their permutations with clustering approach in context free data cleaning”. Int. journal of computer science and security, vol.3, pp. 344-350 2009.
Published
2016-09-23
Section
Articles