Vijaya Bharati P.,Vignans Institute of Engineering for Women VIEW |
Jyothi Prasad K.S.S.,Vignans Institute of Engineering for Women VIEW
2016 International Conference on Information Communication and Embedded Systems, ICICES 2016 | Year: 2016
With the development of computers and its expansion the issue of securing the information has gain special significance. The Internet as a whole does not use secure links, thus information in transit may be vulnerable to interception as well. The importance of reducing a chance of the information being detected during the transmission is being an issue now days. Some solution to be discussed is how to passing information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. This paper deals with a practical scheme for encoding any Indian language, which can be classified under Text Steganography. Here the text can be transmitted via network by encrypting it using any of the cryptographic algorithms. The proposed technique uses the Text and their attributes to hide the secret message. It is based on the fact that the ordering of the attributes in the Text has no impact on the appearance of the document. This ordering can be used to hide the secret messages efficiently. The proposed technique essentially has three components, key file generation, hiding process and extracting process. Hiding process is used to hide a message in Text documents and extracting process is used to extract the hidden message from the Text documents. The key component of the technique is the generation of Cover Message. The Cover Message is essentially a collection of key combinations stored in the form of rows and columns. These combinations are generating by encryption of the saved Text documents. The attributes combinations used in the Text are used to generate a Cover Message. © 2016 IEEE.