New Approach in E-mail Based Text Steganography
AbstractIn this study combination of lossless compression techniques and Vigenere cipher was used in text steganography that makes use of email addresses to be the keys to reconstruct the secret message which has been embedded into the email text. After selecting the cover text that has highest repetition pattern regarding to the secret message the distance matrix was formed. The members of distance matrix were compressed by following lossless compression algorithms as in written sequence; Run Length Encoding (RLE) + Burrows Wheeler Transform (BWT) + Move to Forward (MTF) + Run Length Encoding + Arithmetic Encoding (AE). Later on Latin Square was used to form stego key 1and then Vigenere table was used to increase complexity of extracting stego key 1. Final step was to choose e-mail addresses by using stego key 1 and stego key 2to embed secret message into forward e-mail platform. The experimental results showed that proposed method has reasonable performance with high complexity.
Copyright (c) 2017 International Journal of Intelligent Systems and Applications in Engineering
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.