Microsoft Power Point Files: A Secure Steganographic Carrier

Microsoft Power Point Files: A Secure Steganographic Carrier

Rajesh Kumar Tiwari (RVS College of Engineering & Technology, India) and G. Sahoo (Birla Institute of Technology (BIT) Mesra, India)
Copyright: © 2011 |Pages: 13
DOI: 10.4018/jdcf.2011100102
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

One of the major characteristic of cryptography and steganography is unlimited and limited secret data conversion and embedding respectively. In steganography, concealing unlimited secret data in cover media is unfeasible. Majority of researchers have taken image, text, html, executable files as a steganographic cover media. In this proposed work the authors have considered Microsoft Power Point Files as a cover medium. The authors have developed a methodology which consist two techniques for embedding the valuable unlimited data with three layers of security and high robustness. The resultant stego file undoubtedly can be transmitted any where using any channel. Experimental results show the feasibility of the proposed methodology.
Article Preview

Literature Review

Embedding secret information in text file can be a challenging task. This is because text files have small amount of redundant data that is to be replaced with a secret message. Another drawback is the easy alteration of characters which can be done by unwanted parties. There are some methods by which we can accomplish text based steganography. These methods are:

  • Open Space Method

  • Syntactic Method

  • Semantic Method

There are numerous ways to employ the open space in text files to encode the information. The methods employing open spaces work because a casual reader may avoid one extra space at the end of the line and an extra space between two words does not prompt abnormally. The extra space can be used to conceal one bit either 0 or 1. However, inter-sentence space method encodes a “0” by adding a single space after a period in English prose. Adding two spaces would encode a “1”. The left-shift encoding involves actually shifting each line of text vertically up or down by as little 3 centimeters. The End-of-line space method exploits white space at the end of each line.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing