New Approach in E-mail Based Text Steganography

Abstract

In this study combination of lossless compression techniques and Vigenere cipher was used in text steganography that makes use of email addresses to be the keys to reconstruct the secret message which has been embedded into the email text. After selecting the cover text that has highest repetition pattern regarding to the secret message the distance matrix was formed. The members of distance matrix were compressed by following lossless compression algorithms as in written sequence; Run Length Encoding (RLE) + Burrows Wheeler Transform (BWT) + Move to Forward (MTF) + Run Length Encoding + Arithmetic Encoding (AE). Later on Latin Square was used to form stego key 1and then Vigenere table was used to increase complexity of extracting stego key 1. Final step was to choose e-mail addresses by using stego key 1 and stego key 2to embed secret message into forward e-mail platform. The experimental results showed that proposed method has reasonable performance with high complexity.

Authors and Affiliations

Kemal Tutuncu *| Faculty of Technology, Selcuk University Campus, Konya, Turkey, Abdikarim Abi Hassan| Affiliation not present

Keywords

Related Articles

Matlab’s GA and Optimization Toolbox: A Fourbar Mechanism Application

This study presents an optimization approach for synthesis of planar mechanisms. A four bar mechanism is chosen for an application example. This mechanism is studied with the constraints assigned. Genetic Algorithm (GA)...

Store Data from Experiments with Microorganisms Used in Food Industry

The aim of this paper is to present results from collaboration of computer engineers and experimenters in microbiology working with molecular-genetic methods. The experimenters in microbiological laboratory at the Univer...

The Principal Component Analysis Method Based Descriptor for Visual Object Classification

In the field of machine learning, which values / data labeling or recognition is done by pattern recognition. Visual object classification is an example of pattern recognition, which attempts prompt to assign each object...

The Control of A Non-Linear Chaotic System Using Genetic and Particle Swarm Based On Optimization Algorithms

In this study, the control of a non-linear system was realized by using a linear system control strategy. According to the strategy and by using the controller coefficients, system outputs were controlled for all referen...

Power System Contingency Ranking using Fuzzy Logic Based Approach

Voltage stability is a major concern in planning and operations of power systems. It is well known that voltage instability and collapse have led to major system failures. Modern transmission networks are more heavily lo...

Download PDF file
  • EP ID EP769
  • DOI 10.18201/ijisae.05687
  • Views 389
  • Downloads 23

How To Cite

Kemal Tutuncu *, Abdikarim Abi Hassan (2015). New Approach in E-mail Based Text Steganography. International Journal of Intelligent Systems and Applications in Engineering, 3(2), 54-56. https://europub.co.uk/articles/-A-769