Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 113-124
DOI: 10.3923/rjit.2013.113.124
Short Message (Service) as Key for Steganography
Rengarajan Amirtharajan, Prasad Muralidharan, R. Rajesh, R. Sridevi and J.B.B. Rayappan

Abstract:
In this paper, an unequaled itinerary to effectuate orphic information divvying is proposed wherein habituated steganographic rationale of text. Stand out features of texting like nonintrusive, cost effective, spontaneity; quilt etc. makes it eligible for an efficacious covert communication. The chronic progression of technology is without doubt a boon for us and at the same time is a ban when it comes with uninvited kith and kin of security aftermath. A newly blooming form of steganography is this SMS based routine whose prime concern is solely increased-cum-guaranteed privacy. This study discovers one such style through introduction of time delay betwixt continuous SMS. This work comes under noiseless communication employing cover generation; also it does not neglect the description about previous forerunners to this concept and thus discusses about line and word shifting, open spaces, semantic method etc. Here presented seven methods for a successful text steganography by assigning time delays for every character in a word, by allocating the same according the usage percentile of a letter in an increasing order, for the SMS pattern message, using frequency order of letters, by altering the same by shuffling, with the help of java, by transmitting to different SIMs.
 [Fulltext PDF]   [Fulltext HTML]   [XML: Abstract + References]   [References]   [View Citation]  [Report Citation]
 RELATED ARTICLES:
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
How to cite this article:

Rengarajan Amirtharajan, Prasad Muralidharan, R. Rajesh, R. Sridevi and J.B.B. Rayappan, 2013. Short Message (Service) as Key for Steganography. Research Journal of Information Technology, 5: 113-124.

DOI: 10.3923/rjit.2013.113.124

URL: https://scialert.net/abstract/?doi=rjit.2013.113.124

 
COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 

Curve Bottom