Open Access Open Access  Restricted Access Subscription or Fee Access

A New Approach to Telugu Text Steganography by Shifting Inherent Vowel Signs

Sravani Alameti, Sake Pothalaiah, Dr.K Ashok Babu

Abstract


Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.  The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves.

Cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. Wide ranges of algorithms have been introduced using text, audio, video and images files as covering media. This paper presents a new approach for steganography in Telugu texts. Taking the typical structure of Telugu alphabets into consideration, in this approach, by shifting inherent vowel signs either left or right, we hide the secret message. The approach shows good result on the sample collected from different Telugu newspaper.




Keywords


Information Security, Text Steganography, Information Hiding, Text watermarking, Telugu Text Steganography

Full Text:

PDF

References


C. Cachin, “An Information-Theoretic Model for Steganography”, In 2nd Information Hiding Workshop, vol. 1525, pp. 306-318, 1998

R. Chandramouli, N. Memon, “Analysis of LSB Based Image Steganography Techniques”, In IEEE pp. 1019-1022, 2001

N.F. Johnson, S. Jajodia, “Staganalysis: The Investigation of Hiding Information”, In IEEE, pp. 113-116, 1998

D. Artz, “Digital Steganography: Hiding Data within Data”, In IEEE Internet Computing, pp. 75-80, May-Jun 2001

J. Chen, T.S. Chen, M. W. Cheng, “A New Data Hiding Scheme in Binary Image”, In 5th Int. Symp. on Multimedia Software Engineering, pp. 88-93, 2003

G. Do¨err and J.L. Dugelay, “A Guide Tour of Video Watermarking”, In Signal Processing: Image Communication, vol. 18, Issue 4, pp. 263-282, 2003

G. Do¨err and J.L. Dugelay, “Security Pitfalls of Frameby- Frame Approaches to Video Watermarking”, Trans. Signal Processing, Supplement on Secure Media, IEEE, vol. 52,Issue 10, pp. 2955-2964, 2004

K. Gopalan, “Audio Steganography Using Bit Modification”, In IEEE International Conference on Acoustics, Speech, andSignal Processing,(ICASSP 03), vol. 2, pp. 421-424, 6-10April 2003

J.T. Brassil, S. Low, N.F. Maxemchuk, and L.O’Gorman, “Electronic Marking and Identification Techniques to Discourage Document Copying”, Trans Selected Areas in Communications, IEEE, vol. 13, Issue. 8, pp. 1495-1504, October 1995

T. Moerland, “Steganography and Steganalysis”, www.liacs.nl/home/tmoerlan/privtech.pdf, May 15, 2003

S.H. Low, N.F. Maxemchuk, J.T. Brassil, and L.O’Gorman, “Document Marking and Identification Using Both Line and Word Shifting”, In 14th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM ’95), vol.2, pp. 853-860, 2-6 April 1995

A.M. Alattar and O.M. Alattar, “Watermarking Electronic Text Documents Containing Justified Paragraphs and Irregular Line Spacing”, In SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 685- 695, June 2004

K. Bennett, “Linguistic Steganography: Survey, Analysis, andRobustness Concerns for Hiding Information in Text”, PurdueUniversity, CERIAS Tech. Report 2004-13.

Y. Kim, K. Moon, and I. Oh, “A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics”, In 7th International Conference on Document Analysis and Recognition (ICDAR03), pp. 775-779, 2003

M. Niimi, S. Minewaki, H. Noda, and E. Kawaguchi, “A Framework of Text-based Steganography Using SD-Form Semantics Model”, In Pacific Rim Workshop on Digital Steganography, Kyushu Institute of Technology, Kitakyushu, Japan, July 3-4, 2003

K. Rabah, “Steganography-The Art of Hiding Data”, Trans. Information Technology Journal, vol. 3, Issue 3, pp. 245-269, 2004

Shirali-Shahreza, M.H., Shirali-Shahreza, M., “A New Approach to Persian/Arabic Text Steganography”, In Computer and Information Science, ICIS-COMSAR 2006. 5th IEEE/ACIS International Conference, pp 310-315, 10-12 July 2006

S. Changder, Narayan C. Debnath, “An Approach to Bengali Text Steganography”, SEDE 2008, pp. 74-78, 2008

S. Changder, Narayan C. Debnath, “New Techniques and Algorithms for Text Steganography through Hindi Text” SEDE 2009, pp 200-204, 2009

D. Huang, and H. Yan, “Interword Distance Changes Represented by Sine Waves for Watermarking Text Images”, Trans Circuits and Systems for Video Technology, IEEE, vol. 11, no. 12, pp. 1237-1245, December 2001

Shirali-Shahreza, M., Shirali-Shahreza, M.H., “Text Steganography in SMS”, In Convergence Information Technology, pp. 2260-2265, 2007

Shirali-Shahreza, M.H., Shirali-Shahreza, M., “Text Steganography in Chat”, In 3rd IEEE/IFIP International Conference in Central Asia, pp. 1-5, 26-28 Sept. 2007

Shirali-Shahreza, M, “Text Steganography by Changing Words Spelling”, In 10th International Conference on Advanced Communication Technology, ICACT 08, vol. 3, pp. 1912-1913, 17-20 Feb. 2008

http://acharya.iitm.ac.in/multi sys/peculiar.php, last visited 20 December 2007.

Kostic, D., A. Mitter, Bh. Krishnamurti. 1979. A Short Outline of Telugu Phonetics (particularly pp.202-204 on Phoneme frequencies): Calcutta: ISI.

Krishnamurti, Bh. and J.P.L. Gwynn. 1985. A grammar of Modern Telugu (particularly Chapter5: The structure of Telugu Orthography: Problems of Reform). Delhi:OUP.

krishnamurti, Bh. 1997. telugu lipi nirm¡¸aÆl° unna niyam¡lu. Telugu, 4.1-5. Telugu Akademi.

Narasimham, P.V.H.M.L., G.L. Narasimham, and G. Ramakrishna Rao.1981. Design Information on Text Composition in Telugu (a report of a joint project of Computer Maintenance Corporation Limited (CMC), Secunderabad, and Research Institute for Newspaper Development (RIND), Madras.

Narasimham, S. C. Babu, J. Satyanarayana. 2001.Subcommittee report on Standards for the Implementation of Telugu in Information Technology. Govt of Andhra Pradesh.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.