A Comparative Result Analysis of Text Based SteganographicApproaches

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3

Abstract

Abstract: Today in this digital era everything (data) can be digitized and can be transmitted over thecommunication networks. But not withstanding with this advantage it also has a downside i.e. the digitized datacan be easily accessed illegally, it can be tampered with and copy. The issue of providing security to theinformation has become increasingly important with the development of computer and expanding its use indifferent areas of one's life and work[4]. One of the grounds discussed in information security is the exchange ofinformation through the cover media. In this, different methods such as cryptography, steganography, etc., havebeen used. Many approaches were introduced for making the data secure. But the efficient utilization of those approaches isn’t defined i.e. which approach to be used according to the situations. This paper implements fiveapproaches of Text Steganography to compare their Time and Space complexities by from considering threeText Steganography algorithms from the study of Monika Agarwal's paper entitled "Text SteganographicApproaches :A Comparison"[1] and bring out the comparative results of algorithm for some particular secrettext. The results of the comparisons are shown in form of bar charts and pie charts.

Authors and Affiliations

K. Aditya Kumar Prof. Suresh Pabboju

Keywords

Related Articles

 Holistic and Procedural Features for Authenticating Users

 Security systems help to protect machines or sensitive data from unauthorized users. The need for better and cheap security systems is growing with the growth in technologies and hacking skills of the people. Var...

Computer Forensic Investigation on Hard Drive Data Recovery: A Review Study

Abstract: Computer Forensics is a science of seeking evidence found in computers and digital storage media. The main challenge before computer forensic investigatorsis to examine digital media with the aim of finding, co...

 Survey on Reversible Watermarking

 A number of research papers has been produced about reversible watermarking. Reversible watermarking is one of the important scheme of the watermarking schemes. Some security measures must be  there to prot...

A Proposed System for Tracking Invaded from the Crisis Zone Using RFID and Sensors

Abstract: This study is to show how sensors can help rescuing affected people from the casualty area caused by natural or human caused disaster. Sensors that will use Radio Frequency Identification to transmit the data t...

 Efficient Techniques for Unauthorized Attacks with Time-Stamp

 Abstract: In many applications it is very useful to identify the unexpected activities on data with respect totime. Cyber security is one of the application area in which we are using intrusion detection system to...

Download PDF file
  • EP ID EP100632
  • DOI -
  • Views 90
  • Downloads 0

How To Cite

K. Aditya Kumar Prof. Suresh Pabboju (2015).  A Comparative Result Analysis of Text Based SteganographicApproaches. IOSR Journals (IOSR Journal of Computer Engineering), 17(3), 70-74. https://europub.co.uk/articles/-A-100632