Communication in Veil: Enhanced Paradigm for ASCII Text Files
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 7
Abstract
Digitization has a persuasive impact on information and communication technology (ICT) field which can be realized from the fact that today one seldom think to stand in long awaiting queue just to deposit utility bills, buy movie ticket, or dispatch private letters via post office etc. as these and other such similar activities are now preferably being done electronically over internet which has shattered the geographical boundaries and has tied the people across the world into a single logical unit called global village. The efficacy and precision with which electronic transactions are made is commendable and is one of the reasons why more and more people are switching over to e-commerce for their official and personal usage. Via social networking sites one can interact with family and friends at any time of his/her choice. The darker side of this comforting aspect, however, is that the contents sent on/off-line may be monitored for active or passive intervention by the antagonistic forces for their illicit motives ranging from but not only limited to password, ID and social security number theft to impersonation, compromising personal information, blackmailing etc. This necessitated the need to hide data or information of some significance in an oblivious manner in order to detract the enemy as regards its detection. This paper aims at evolving an avant-garde information hiding scheme for ASCII text files - a research area regarded as the most difficult in contrast to audio, video or image file formats for the said purpose
Authors and Affiliations
Khan Rafat, Muhammad Sher
Towards A Framework for Multilayer Computing of Survivability
The notion of survivability has an important position in today enterprise systems and critical functions. This notion has been defined in different ways. However, lacking a comprehensive and multilayer model for computin...
Using Sab-Iomha for an Alpha Channel based Image Forgery Detection
Digital images are a very popular way of transfer-ring media. However, their integrity remains challenging because these images can easily be manipulated with the help of software tools and such manipulations cannot be v...
A Random-Walk Based Privacy-Preserving Access Control for Online Social Networks
Online social networks are popularized with people to connect friends, share resources etc. Meanwhile, the online social networks always suffer the problem of privacy exposure. The existing methods to prevent exposure ar...
ComEx Miner: Expert Mining in Virtual Communities
The utilization of Web 2.0 as a platform to comprehend the arduous task of expert identification is an upcoming trend. An open problem is to assess the level of expertise objectively in the web 2.0 communities formed. We...
Content-Based Image Retrieval Using Texture Color Shape and Region
Interests to accurately retrieve required images from databases of digital images are growing day by day. Images are represented by certain features to facilitate accurate retrieval of the required images. These features...