Design of evaluation procedures for letter-based techniques in text ste ganography method

Steganography is one of information hiding area that covers the information in any medium domain such as text, image, audio and video. One of steganography categories in the medium of text is called text steganography. It conceals hidden message with embedding the text via various methods such as ho...

Full description

Saved in:
Bibliographic Details
Main Author: Utama, Sunariya
Format: Thesis
Language:eng
eng
Published: 2017
Subjects:
Online Access:https://etd.uum.edu.my/6960/1/s817462_01.pdf
https://etd.uum.edu.my/6960/2/s817462_02.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.6960
record_format uketd_dc
institution Universiti Utara Malaysia
collection UUM ETD
language eng
eng
advisor Mahmuddin, Massudi
Din, Roshidi
topic TA Engineering (General)
Civil engineering (General)
spellingShingle TA Engineering (General)
Civil engineering (General)
Utama, Sunariya
Design of evaluation procedures for letter-based techniques in text ste ganography method
description Steganography is one of information hiding area that covers the information in any medium domain such as text, image, audio and video. One of steganography categories in the medium of text is called text steganography. It conceals hidden message with embedding the text via various methods such as horizontally shifting, vertically shifting or based on the letter of text structures. Many researchers utilize the feature-based technique to cover hidden message based on uniqueness of letter. Therefore, this study intends to focus on specific type of feature-based technique which is the letter-based text steganography. However, there is still issue relating to this method which the existence of the technique in the text is easily discoverable by attackers. Literature indicated that this issue is probably rooted from the lack of verification and validation procedures during the development of the steganography method. This study aims to identify the suitable parameters for verification and validation process. In addition, the parameters will then be used in conducting evaluation on the letter-based text steganography. The outcome of this study showed that the parameters which involved in verification and validation process will be able to improve the performance and security of the technique.
format Thesis
qualification_name masters
qualification_level Master's degree
author Utama, Sunariya
author_facet Utama, Sunariya
author_sort Utama, Sunariya
title Design of evaluation procedures for letter-based techniques in text ste ganography method
title_short Design of evaluation procedures for letter-based techniques in text ste ganography method
title_full Design of evaluation procedures for letter-based techniques in text ste ganography method
title_fullStr Design of evaluation procedures for letter-based techniques in text ste ganography method
title_full_unstemmed Design of evaluation procedures for letter-based techniques in text ste ganography method
title_sort design of evaluation procedures for letter-based techniques in text ste ganography method
granting_institution Universiti Utara Malaysia
granting_department Awang Had Salleh Graduate School of Arts & Sciences
publishDate 2017
url https://etd.uum.edu.my/6960/1/s817462_01.pdf
https://etd.uum.edu.my/6960/2/s817462_02.pdf
_version_ 1747828136707358720
spelling my-uum-etd.69602021-08-18T08:21:17Z Design of evaluation procedures for letter-based techniques in text ste ganography method 2017 Utama, Sunariya Mahmuddin, Massudi Din, Roshidi Awang Had Salleh Graduate School of Arts & Sciences Awang Had Salleh Graduate School of Arts and Sciences TA Engineering (General). Civil engineering (General) Steganography is one of information hiding area that covers the information in any medium domain such as text, image, audio and video. One of steganography categories in the medium of text is called text steganography. It conceals hidden message with embedding the text via various methods such as horizontally shifting, vertically shifting or based on the letter of text structures. Many researchers utilize the feature-based technique to cover hidden message based on uniqueness of letter. Therefore, this study intends to focus on specific type of feature-based technique which is the letter-based text steganography. However, there is still issue relating to this method which the existence of the technique in the text is easily discoverable by attackers. Literature indicated that this issue is probably rooted from the lack of verification and validation procedures during the development of the steganography method. This study aims to identify the suitable parameters for verification and validation process. In addition, the parameters will then be used in conducting evaluation on the letter-based text steganography. The outcome of this study showed that the parameters which involved in verification and validation process will be able to improve the performance and security of the technique. 2017 Thesis https://etd.uum.edu.my/6960/ https://etd.uum.edu.my/6960/1/s817462_01.pdf text eng public https://etd.uum.edu.my/6960/2/s817462_02.pdf text eng public masters masters Universiti Utara Malaysia Agarwal, M. (2013). Text steganography approaches: a comparison. International Journal of Network Security & Its Applications (IJNSA), 5(1), 91-106. Alam, M. N. & Naser, M. A. (2013). Re-evaluating Chain-Code as A Feature Bangla Script. 2013 International Conference on Electrical Information and Communication Technology (EICT), 1-5. Altagani, A. & Bary, B. (2013). A hybrid approach to secure transmitted messages using advanced encryption standard (AES) and word-shift coding protocol. International Conference on Computing, Electrical, and Electronic Engineering (ICCEE), 134-140. Alves, M. C. B., Drusinsky, D., & Michael, J. B. (2013). End-to-End Formal Specification, Validation, and Verification Process: A Case Study of Space Flight Software. IEEE Systems Journal, 7(4), 632-641. Amin, M. M., Ibharahim, S., Salleh Mazleena., & Katmin, M. R. (2003). Information using steganography. Research report, Universiti Teknologi Malaysia, Johor Bahru, Malaysia. Arora, D., Raghunatan, A., & Jha, N. K. (2005). Enhancing security through hardware-assisted run-time validation of program data properties. International Conference on Hardware/Software Codesign and System Synthesis, 190-195. Bandyopadhai, S. K., Bhattacarryya, D., Ganguly, D., Mukherje, S., & Das, P. (2008).A tutorial review on steganography. International Conference on Contemporary Computing, 105-114. Banerjee, I. ,Bhattacharya, S., & Synal, G. (2011). Novel text steganography through special code generation. International Conference Systematic, Cybermetics and Informatics, 298-303. Berrard, B., Bidoit, M., Finkel, A., Laroussinie, F., Petit, A., Petruci, L., Schnoeloeben, P., Mckenzie, P. (2001). Systems and software verification: Model-checking Technique and Tools. Barkeley: Springer. Bhattacharya, S., Indu, P., Duta, S., Biswas, A., & Sanyal, G. (2011) Hiding data in text through in alphabet letter patterns (CALP). , Journal of Global Research in Computer Science, 2(3), 33-39. Catal, C. 2012. Performance evaluation metrics for software fault prediction studies. Acta Polytechnica Hungarica, 9 (4), 193-206 Chand, V & Orgun, C. O. (2006). Exploiting linguistic feature in lexical steganography : design and proof-of-concept implementation. Proceedings of the 39th Hawaii International Conference on System Sciences, 1-10. Chang, C & Clark, S. (2010). Practical linguistic steganography using contextual Synonym Substitution and Vertex Colour Coding. Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing, 1194-1203. Changder, S., Debnath N.C., & Ghosh, D. (2009). A new approach to hindi text steganography by shifting matra. 2009 International Conference on Advances in Recent Technologies in Communication and Computing, 199-202. Chen, Y., S, W., Hsiung, P., Lan, Y., Hu, Y. & Chen, S. (2010). Formal modeling and verification for network-on-chip. IEEE Systems Journal, 299-304. Clarke, C., E, Pfluegel, E & Tsaptionis, D. (2014). Hide-as-you-Type: An approach to natural language steganography through sentence modification. 2014 IEEE International Conference on High Performance Computing and Communication (HPCC), 946-952. Das, H., Jarfour, A., Orlitsky, A., Pan, S., Suresh, A. T. (2012). On the query computation and verification of functions. 2012 IEEE International Symposium on Information Theory Proceedings, 2711-276. 978-1-4673-2579-0/12/$31.00 ©2012 IEEE. Das, S. S. C., & G, Debnath (2010). Text steganography through Indian language using feature coding method. International Conference on Computer Technology and Development (ICCTD 2010), 2,501-506. Das, H., Jafarpour, A., Orlitsky, A., Pan, S., Suresh, A. T. (2012). On The Query computation and verification of functions. 2012 IEEE International Symposium on Information Theory Proceeding, 2711-2715. Dasso, A. & Funes, A. (2007), Verification, validation, and testing in software engineering. London: Idea Group Publishing. Debole, F & Sebastiani, F. (2005). An analysis of the relative difficulty of Reuters-21578 subsets, Journal of the American Society for Information Science and technology, 584-596. Davila, J. J. (1999). Genetic optimizational of neural network topologies for the task of natural language processing, Proceeding of the International Joint Conference on Neural Network, Washington. Din, R. & Samsudin, A. (2009). Digital steganalysis: computational intelligence approach. Naun International Journal of Computer, 3(1), 161-170. Din, R., Samsudin, A. & Lertkrai, P. (2012). A framework component for natural language steganalysis. International Journal of Computer Theory and Engineering, 4(4), 641-645. Din, R., Che Ani, Z., Samsudin A. (2012). A Formulation of conditional State Steganalysis. WSEAS Transaction on Mathematic, 11(3), 173-182. E-ISSN: 2224-2880 Dulera, S. Jinwala, D & Dasgupta, A. (2011). Experimenting with the novel approaches in text steganography. International Journal of Network Security & Its Applications (IJNSA), 3(6), 213-225. Fawcett, T. (2005). An Introduction to ROC analysis. Science direct Pattern Recognation 27, 861-874. Garg, M. (2011). A novel text steganography technique based on HTML document. International Journal of Advanced Science and Technology, 35, 129-138. Ghosh, S. C. D. & Debnath, N. C. (2010). LCS based text steganography through Indian languages. . International Conference on Computer Technology and Development, 53-57. Ghuman, W. A. & Lassig, J. (2013). Verification requirement for secure reliable cloud computing. 2013 IEEE Third International Conference on Cloud and Green Computing, 143-150. Grothoff, C., Grothoff, H., Alkhutova, L., Stutsman, R., Atallah, M.J., (2005). Translation based steganography. In: Proceedings of Information hiding workshop (IH), 213–233. Gutub A. A. A. & Fattani M. M. (2007). A novel Arabic text steganography method using letter point and extention. International Journal of Computer, Information, Systems and Control Engineering, 1(3), 483-486. Hempelmann, C. F. & Mehra, V. (2011). Baseline semantic spam filtering. 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 273-276. Iyer, S. S. & Laktharia, K. (2016). New robust and secure alphabet pairing text steganography algorithm. International Journal of Current Trends in Engineering & Research (IJCTER), 2(7), 15-21. Kaleem, M. K. (2012). An overview of various forms of linguistic steganography and their application in protecting data. Journal of Global Research in Computer Science, 3(5), 33-37, ISSN 2229-371X. Kataria, S., Sing, K., Kumar, T., & Nehra, M. S. (2013). ECR (Encryption with Cover Text and Reordering) based text steganography. Proceeding of the 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013), 612-616. Kaufman, L. M. (2009). Data security in the world of cloud computing. IEEE Security and Privacy, 7(4), 61-64. Kothari, V., & Goyal, D. (2013). New and unconventional technique in pictorial steganography and steganalysis, IOSR Journal of Computer Engineering (IOSR-JCE), 13 (3), 37-41. Kumar, R., Chand, S., & Sing, S. (2014). An email based high capacity text steganography scheme using combinatorial compression. 5th International Conference- Confluence The Next Generation Information Technology Summit (Confluence), 336-339. Kumar, R., Malik, A., Singh, S. & Chand, S. (2014) A high capacity email based text steganography scheme using huffman compression. 3rd International Conference on Signal Processing and Integrated Networks (SPIN), 53-56. Li, L., Huang, L., Zhao, X., Yang, W., & Chen, Z. (2008). A statistical attack on kind of word-shift text steganography. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 1503-1507. Ling, J., Chen, J., & Liu, C. (2008). An automatic mechanism for adjusting validation function. 22nd International Conference on Advanced Information Networking and Applications, 602-607. Liu, M. Guo, Y., & Zhou, L. (2009). Text steganography based on online chat. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 807-811. Lu, H., Jianbin, L. , Tianzhi, L., Dingyi, F. (2009). An anti-attack watermaking based on synonym substitution for hinese Text. 2009 Fifth International Conference on Information Assurance and Security, 356-369. Mahato, S., Yadav, D. K., & Khan, D. A. (2013). A modified approach to text steganography using HyperText markup language. 2012 Third International Conference on Advanced Computing & Communication Technologies, 40-44. Majerjak, D., Banoci, V., Broda, M., Bugar, G., & Levicky, D. (2013). Performance evaluation of feature-based steganalysis in steganography. 2013 Conference Radioelectronika, 377-382. Marincic, J., Mader, A., Wieringa, R. (2011). Validation of embedded system verification models. IEEE Journal Systems, 48-54. Memon, J. A., Khowaja, K., & Kazi, H. (2008). Evaluation of steganography for Urdu/Arabic text. Journal of Theoretical and Applied Information Technology, 232-237. Moffat, A. & Zobel, J. (2008). Rank-biased precision for measurement of retrieval effectiveness. ACM Transactions on Information Systems 27 (1). Muhammad, H. Z., Rahman, S. M. S. A., & Shakil, A (2009). Synonym based malay linguistic text steganography 2009 Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA 2009), 423-427. Munoz, A., Carracedo, J, & Alvarez, I. A, (2010). Measuring the security of linguistic steganography in Spanish based on synonymous paraphrasing with WSD. 2010 10th IEEE International Conference on Computer and Information Technology (CIT 2010),965-970. Nagarhalli, T. P., Bakal, J. W. & Jain, N. (2016). A Survey of Hindi text steganography. International Journal of Scientific & Engineering Research, 7(3), 55-61. Nasab, M., V. & Shafiei, B., M. (2011).Steganography in programming. Australian Journal of Basic and Applied S ciences, 5(12),1496-1499. Nazir, S., Motla, Y. H., Abbas, T., Khaton A., Jaben, J., Iqra, M., & Bakhtar, K. (2014). A process improvement in requirement verification and validation using ontology. IEEE Systems Journal, 1-8. Oberkampf, W. L. & Roy, C. J. (2010). Verification and validation in scientific computing. New York: Cambridge University Press. Odeh, A. Alzubi, A. Hani, Q. B., & Elleithy, K. (2012). Steganography by multipoint Arabic letters. Systems, Applications and Technology Conference (LISAT), 2012 IEEE Long Island , 1-7. Odeh, A., Khaled, E., & Feazipour. (2013). Text steganography using language remarks. 2013 ASEE Northeast Section Conference,1-7. Odeh, A., Elleithy, K.,& Faezipur, M. (2014). Steganography in text by using MS Word symbols. Proceeding of zone 1 conference of the American Society Engineering Education, 1-5. Osman, B., Din, R., Tuan Muda, T. Z., & Omar, M. N. (2013). A Performance embedding process for text steganogrpaphy. Proceeding 2013 WSEAS ISP Nanjing. Pathak, M. (2010). A new approach for text steganography using Hindi numerical code.2010 International Journal of Computer Application (0975-8887), 1 (8), 56-59. Por, L. Y., & Delina, B. (2008). Information hiding: A new approach in text steganography. 7th WSEAS International Conference on Applied Computer & Applied Computational Science (ACACOS). 689-695. Rahmat, R., Kamel, N. S., & Yahya, N. (2009). Subspace-based signature verification technique using reduced-sensor data glove. 2009 IEEE Symposium on Industrial Electronics and Applications (ISIEA 2009),83-88. Reddy, P. K. R., Nagaraju C., & Subramanyam N. (2014). Text encryption through level based privacy using DNA steganography. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 3(3), 168-172. ISSN 2278-6856. Rogovchenko, L. B., Fritzon, P., Garo A., & Tundis, A. (2013). Requirement verification and dependency tracing during simulation in modelica. 2013 8th EUROSIM Congress on Modelling and Simulation, 561-565. Roy, S. & Manasmiti, M. (2011). A novel approach to format based steganography. ICCCS’11, 511-517. ACM 978-1-4503-0464-1/11/02. Sampaiboon, N. & Dailey, M. N. (2008). Steganography in thai text. Proceeding of ECTI-CON 2008, 113-136. Satir, E. & Iskik, H. (2012). A Comparison-based on steganography method. Journal of System and Software, 85(10), 2385-2394. Sergeant, R. G. (2013). An introduction to verification and validation of simulation models. Proceeding of the 2013 Winter Simulation Conference, 321-327. 978-1-4799-3950-3/13. Shahreza, M. H. S. & Shahreza, M. H. (2008). A new synonym text steganography. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 1524-1526. Sharma, M. K., Upadhya, A. & Agarwal, S. (2013). Adaptive steganographic algorithm using cryptographic encryption RSA algorithm. Journal of Engineering, Computer & Applied Science (JEC &AS), 2(1), 1-3. Sing, H., Sing, P. K., & Saroha, K. (2009). A Survey on text based steganography. Proceeding of 3rd National Conference; INDIACom-2009 Computing For Nation Development, 1-6. Stutsman R., Atallah M.J., Grothoff, C., & Grothoff K. (2006). Lost in just translation, Proceeding of the 21st Annual ACM Symposium on Applied computing (SAC 2006), Dijon, France, 338-345. Sui, X. G. and Luo, H. (2004) A New steganography method based on Hypertext. National Key Lab of Modern Signal Processing, Southwest Inst of electron & telcom.181-184. Sulaiman, H, A. (2008). A natural language steganography technique for text hiding using LSB’s. Computer Science Information System Eng & Tech, 26(3), 351-356. Sun, X., Meng, P., Ye, Y., & Hang, L. (2010). Steganography in Chinese text. 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), V8, 651-655. Talip, M., Jamal, A., & Qiang, G. W. (2012). A proposed steganography method to Uyghur script. 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover,125-128. Topkara, U., Topkara, M., & Attalah, M.J. (2006). The hiding virtues of ambiguity: quantifiably sesilient watermarking of natural language text through synonym substitutions. Proceedings of the 8th workshop on Multimedia and security, 164-174. Userner, C. A., Gruttman, S., Majchrzak, T. A., & Kuchen, H. (2010). Computer-supported assessment of software verification proof. International Conference on Educational and Information Technology (ICEIT 2010),115-121. Wang, F., Huang, L., Chen, Z., Yang, W., & Miao, H. (2013). A novel text steganography by context-based equivalent substitution. Signal Processing, Communication and Computing (ICSPCC), 2013 IEEE International Conference,1-6. Xinhua, L., Weida, W., & Wenjian L. (2007). An intelligent methodology for business process model verification. 2007 IEEE International Conference on Control and Automation FrB6-2 Guangzhou, CHINA, 2381-2385. Wen, Y. (2009). An effectiveness measurement model for knowledge management. Journal of Operations Management, 22(5), 363-367. Wu, X & Yang, Z. (2013). Verification-based interval-passing algorithm for compressed sensing. IEEE Signal Processing Letters, 20 (10), 934-936. Yang, H. & Kot, A.C. (2004). Text document authentification By integrating inter character and ppace watermarking. IEEE International Conference on Multimedia and Expo (ICME) 955-959. Yuling, L., Xingming, S., Can, G., Hong, W. (2007). An efficient linguistic steganography for Chinese text. Multimedia and Expo, 2007 IEEE International Conference, 2094-2097. Zhang, W. , Zheng, Z., Pu, G., & Zhuo, H. (2006). Chinese text watermarking based on occlusive components. 2nd Information and Communication Technologies (ICTTA), 1, 1850-1854, ISBN: 0-7803-9521-2. Zheng, Y., Liu, Y., Luo, X., and Yang, C. (2012). A method based on feature matching to identify steganography software. 2012 Fourth International Conference on Multimedia Information Networking and Security, (989-992). 2012 IEEE DOI 10.1109/MINES.2012.26.