"Advanced steganographic approach for hiding encrypted secret message in LSB,LSB+1,LSB+2 and LSB+3 bits in non standard cover files"

In digital steganography normally image, audio or video files are the standard cover files or the host files for embedding secret message such as text, image, audio or video. Nath et al.(2) explored the standard method for hiding secret message inside standard cover files such as image, audio or vid...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of computer applications 2011-01, Vol.14 (7), p.31-35
Hauptverfasser: Nath, Joyshree, Das, Sankar, Agarwal, Shalabh, Nath, Asoke
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 35
container_issue 7
container_start_page 31
container_title International journal of computer applications
container_volume 14
creator Nath, Joyshree
Das, Sankar
Agarwal, Shalabh
Nath, Asoke
description In digital steganography normally image, audio or video files are the standard cover files or the host files for embedding secret message such as text, image, audio or video. Nath et al.(2) explored the standard method for hiding secret message inside standard cover files such as image, audio or video files. In the present work we have shown how we can hide secret message in encrypted form in some non standard cover files such as .exe, .com, .pdf, .doc, .xls, .mdb, .ppt files. However, the size of the secret message must be very small in comparison to cover file. The secret message is converted to encrypted form using MSA algorithm(2) and then we hide the encrypted message inside the non standard cover file. To hide encrypted secret message we insert the 8 bits in 2 consecutive bytes of cover file in LSB, LSB+1, LSB+2 and LSB+3 positions. This method could be very effective to hide some information in some executable file. To make the entire process secured we have introduced the password when we hide message and while encrypting the secret message we have to input some text_key. While hiding secret message in cover file we embed 1 byte information in two consecutive bytes of the cover file. There is a risk factor that it may damage the cover file in such a way that the embedded cover file may not behave in proper way as it was behaving before insertion of secret message. However, there is one advantage that we can embed more data in a cover file. We propose that our new method could be most appropriate for hiding any file in any non-standard cover file such as executable file such as .EXE or .COM file, compiler, MS-Office files, Data Base files such as .MDB, .PDF file. Our method will now give open challenge to all user that it is possible to hide any small secret message inside in any non standard cover files. The present work shows that we can hide information in almost all files except pure text or ASCII file. The only restriction is the size of secret message should be extremely small in comparison to cover file. The present method may be implemented in digital water marking in any legal electronic documents, Bank data transactions, in government sectors, in defense, in schools and colleges.
doi_str_mv 10.5120/1894-2522
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1671244566</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2280386481</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1692-16285a038c97d46d8d99c7c350eb738902314d6f39c99cf3db4da9749302ab3c3</originalsourceid><addsrcrecordid>eNpdkU1LAzEQhhdRsNQe_AehJ6Wu5nuTYy1-QcGDel6ySXa7pU3WZFvo3R9u1noQBzIT3nmYZHiz7BLBW4YwvENC0hwzjE-yEZQFy4UQxemf-3k2iXENUxCJuaSj7Gs6N3vltDUg9rZRzjdBdatWA9V1wSu9ArUPYNWa1jXAOh0OXT_AVgfbg62NUTUWtA4s3-5v0pmhn4yBcmbQZgRUbR8HwnmXHkm6CgZov7cB1O3GxulFdlarTbST3zrOPh4f3hfP-fL16WUxX-YacYlzxLFgChKhZWEoN8JIqQtNGLRVQYSEmCBqeE2kTo2amIoaJQsqCcSqIpqMs6vj3LTZ587Gvty2UdvNRjnrd7FEvECYUsZ5Qqf_0LXfBZd-VwpGKWGIFAm6PkI6-BiDrcsutFsVDiWC5eBIOThSDo6QbyrYelM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>854435137</pqid></control><display><type>article</type><title>"Advanced steganographic approach for hiding encrypted secret message in LSB,LSB+1,LSB+2 and LSB+3 bits in non standard cover files"</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Nath, Joyshree ; Das, Sankar ; Agarwal, Shalabh ; Nath, Asoke</creator><creatorcontrib>Nath, Joyshree ; Das, Sankar ; Agarwal, Shalabh ; Nath, Asoke</creatorcontrib><description>In digital steganography normally image, audio or video files are the standard cover files or the host files for embedding secret message such as text, image, audio or video. Nath et al.(2) explored the standard method for hiding secret message inside standard cover files such as image, audio or video files. In the present work we have shown how we can hide secret message in encrypted form in some non standard cover files such as .exe, .com, .pdf, .doc, .xls, .mdb, .ppt files. However, the size of the secret message must be very small in comparison to cover file. The secret message is converted to encrypted form using MSA algorithm(2) and then we hide the encrypted message inside the non standard cover file. To hide encrypted secret message we insert the 8 bits in 2 consecutive bytes of cover file in LSB, LSB+1, LSB+2 and LSB+3 positions. This method could be very effective to hide some information in some executable file. To make the entire process secured we have introduced the password when we hide message and while encrypting the secret message we have to input some text_key. While hiding secret message in cover file we embed 1 byte information in two consecutive bytes of the cover file. There is a risk factor that it may damage the cover file in such a way that the embedded cover file may not behave in proper way as it was behaving before insertion of secret message. However, there is one advantage that we can embed more data in a cover file. We propose that our new method could be most appropriate for hiding any file in any non-standard cover file such as executable file such as .EXE or .COM file, compiler, MS-Office files, Data Base files such as .MDB, .PDF file. Our method will now give open challenge to all user that it is possible to hide any small secret message inside in any non standard cover files. The present work shows that we can hide information in almost all files except pure text or ASCII file. The only restriction is the size of secret message should be extremely small in comparison to cover file. The present method may be implemented in digital water marking in any legal electronic documents, Bank data transactions, in government sectors, in defense, in schools and colleges.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/1894-2522</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>COM ; Digital ; Hides ; Messages ; Portable document format ; Texts</subject><ispartof>International journal of computer applications, 2011-01, Vol.14 (7), p.31-35</ispartof><rights>Copyright Foundation of Computer Science 2011</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1692-16285a038c97d46d8d99c7c350eb738902314d6f39c99cf3db4da9749302ab3c3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Nath, Joyshree</creatorcontrib><creatorcontrib>Das, Sankar</creatorcontrib><creatorcontrib>Agarwal, Shalabh</creatorcontrib><creatorcontrib>Nath, Asoke</creatorcontrib><title>"Advanced steganographic approach for hiding encrypted secret message in LSB,LSB+1,LSB+2 and LSB+3 bits in non standard cover files"</title><title>International journal of computer applications</title><description>In digital steganography normally image, audio or video files are the standard cover files or the host files for embedding secret message such as text, image, audio or video. Nath et al.(2) explored the standard method for hiding secret message inside standard cover files such as image, audio or video files. In the present work we have shown how we can hide secret message in encrypted form in some non standard cover files such as .exe, .com, .pdf, .doc, .xls, .mdb, .ppt files. However, the size of the secret message must be very small in comparison to cover file. The secret message is converted to encrypted form using MSA algorithm(2) and then we hide the encrypted message inside the non standard cover file. To hide encrypted secret message we insert the 8 bits in 2 consecutive bytes of cover file in LSB, LSB+1, LSB+2 and LSB+3 positions. This method could be very effective to hide some information in some executable file. To make the entire process secured we have introduced the password when we hide message and while encrypting the secret message we have to input some text_key. While hiding secret message in cover file we embed 1 byte information in two consecutive bytes of the cover file. There is a risk factor that it may damage the cover file in such a way that the embedded cover file may not behave in proper way as it was behaving before insertion of secret message. However, there is one advantage that we can embed more data in a cover file. We propose that our new method could be most appropriate for hiding any file in any non-standard cover file such as executable file such as .EXE or .COM file, compiler, MS-Office files, Data Base files such as .MDB, .PDF file. Our method will now give open challenge to all user that it is possible to hide any small secret message inside in any non standard cover files. The present work shows that we can hide information in almost all files except pure text or ASCII file. The only restriction is the size of secret message should be extremely small in comparison to cover file. The present method may be implemented in digital water marking in any legal electronic documents, Bank data transactions, in government sectors, in defense, in schools and colleges.</description><subject>COM</subject><subject>Digital</subject><subject>Hides</subject><subject>Messages</subject><subject>Portable document format</subject><subject>Texts</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNpdkU1LAzEQhhdRsNQe_AehJ6Wu5nuTYy1-QcGDel6ySXa7pU3WZFvo3R9u1noQBzIT3nmYZHiz7BLBW4YwvENC0hwzjE-yEZQFy4UQxemf-3k2iXENUxCJuaSj7Gs6N3vltDUg9rZRzjdBdatWA9V1wSu9ArUPYNWa1jXAOh0OXT_AVgfbg62NUTUWtA4s3-5v0pmhn4yBcmbQZgRUbR8HwnmXHkm6CgZov7cB1O3GxulFdlarTbST3zrOPh4f3hfP-fL16WUxX-YacYlzxLFgChKhZWEoN8JIqQtNGLRVQYSEmCBqeE2kTo2amIoaJQsqCcSqIpqMs6vj3LTZ587Gvty2UdvNRjnrd7FEvECYUsZ5Qqf_0LXfBZd-VwpGKWGIFAm6PkI6-BiDrcsutFsVDiWC5eBIOThSDo6QbyrYelM</recordid><startdate>20110101</startdate><enddate>20110101</enddate><creator>Nath, Joyshree</creator><creator>Das, Sankar</creator><creator>Agarwal, Shalabh</creator><creator>Nath, Asoke</creator><general>Foundation of Computer Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20110101</creationdate><title>"Advanced steganographic approach for hiding encrypted secret message in LSB,LSB+1,LSB+2 and LSB+3 bits in non standard cover files"</title><author>Nath, Joyshree ; Das, Sankar ; Agarwal, Shalabh ; Nath, Asoke</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1692-16285a038c97d46d8d99c7c350eb738902314d6f39c99cf3db4da9749302ab3c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>COM</topic><topic>Digital</topic><topic>Hides</topic><topic>Messages</topic><topic>Portable document format</topic><topic>Texts</topic><toplevel>online_resources</toplevel><creatorcontrib>Nath, Joyshree</creatorcontrib><creatorcontrib>Das, Sankar</creatorcontrib><creatorcontrib>Agarwal, Shalabh</creatorcontrib><creatorcontrib>Nath, Asoke</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nath, Joyshree</au><au>Das, Sankar</au><au>Agarwal, Shalabh</au><au>Nath, Asoke</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>"Advanced steganographic approach for hiding encrypted secret message in LSB,LSB+1,LSB+2 and LSB+3 bits in non standard cover files"</atitle><jtitle>International journal of computer applications</jtitle><date>2011-01-01</date><risdate>2011</risdate><volume>14</volume><issue>7</issue><spage>31</spage><epage>35</epage><pages>31-35</pages><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>In digital steganography normally image, audio or video files are the standard cover files or the host files for embedding secret message such as text, image, audio or video. Nath et al.(2) explored the standard method for hiding secret message inside standard cover files such as image, audio or video files. In the present work we have shown how we can hide secret message in encrypted form in some non standard cover files such as .exe, .com, .pdf, .doc, .xls, .mdb, .ppt files. However, the size of the secret message must be very small in comparison to cover file. The secret message is converted to encrypted form using MSA algorithm(2) and then we hide the encrypted message inside the non standard cover file. To hide encrypted secret message we insert the 8 bits in 2 consecutive bytes of cover file in LSB, LSB+1, LSB+2 and LSB+3 positions. This method could be very effective to hide some information in some executable file. To make the entire process secured we have introduced the password when we hide message and while encrypting the secret message we have to input some text_key. While hiding secret message in cover file we embed 1 byte information in two consecutive bytes of the cover file. There is a risk factor that it may damage the cover file in such a way that the embedded cover file may not behave in proper way as it was behaving before insertion of secret message. However, there is one advantage that we can embed more data in a cover file. We propose that our new method could be most appropriate for hiding any file in any non-standard cover file such as executable file such as .EXE or .COM file, compiler, MS-Office files, Data Base files such as .MDB, .PDF file. Our method will now give open challenge to all user that it is possible to hide any small secret message inside in any non standard cover files. The present work shows that we can hide information in almost all files except pure text or ASCII file. The only restriction is the size of secret message should be extremely small in comparison to cover file. The present method may be implemented in digital water marking in any legal electronic documents, Bank data transactions, in government sectors, in defense, in schools and colleges.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/1894-2522</doi><tpages>5</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0975-8887
ispartof International journal of computer applications, 2011-01, Vol.14 (7), p.31-35
issn 0975-8887
0975-8887
language eng
recordid cdi_proquest_miscellaneous_1671244566
source EZB-FREE-00999 freely available EZB journals
subjects COM
Digital
Hides
Messages
Portable document format
Texts
title "Advanced steganographic approach for hiding encrypted secret message in LSB,LSB+1,LSB+2 and LSB+3 bits in non standard cover files"
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T10%3A24%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=%22Advanced%20steganographic%20approach%20for%20hiding%20encrypted%20secret%20message%20in%20LSB,LSB+1,LSB+2%20and%20LSB+3%20bits%20in%20non%20standard%20cover%20files%22&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Nath,%20Joyshree&rft.date=2011-01-01&rft.volume=14&rft.issue=7&rft.spage=31&rft.epage=35&rft.pages=31-35&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/1894-2522&rft_dat=%3Cproquest_cross%3E2280386481%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=854435137&rft_id=info:pmid/&rfr_iscdi=true