Subscribe Now Subscribe Today
Science Alert
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 113-124
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Short Message (Service) as Key for Steganography

Rengarajan Amirtharajan, Prasad Muralidharan, R. Rajesh, R. Sridevi and J.B.B. Rayappan

In this paper, an unequaled itinerary to effectuate orphic information divvying is proposed wherein habituated steganographic rationale of text. Stand out features of texting like nonintrusive, cost effective, spontaneity; quilt etc. makes it eligible for an efficacious covert communication. The chronic progression of technology is without doubt a boon for us and at the same time is a ban when it comes with uninvited kith and kin of security aftermath. A newly blooming form of steganography is this SMS based routine whose prime concern is solely increased-cum-guaranteed privacy. This study discovers one such style through introduction of time delay betwixt continuous SMS. This work comes under noiseless communication employing cover generation; also it does not neglect the description about previous forerunners to this concept and thus discusses about line and word shifting, open spaces, semantic method etc. Here presented seven methods for a successful text steganography by assigning time delays for every character in a word, by allocating the same according the usage percentile of a letter in an increasing order, for the SMS pattern message, using frequency order of letters, by altering the same by shuffling, with the help of java, by transmitting to different SIMs.
PDF Fulltext XML References Citation Report Citation
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
How to cite this article:

Rengarajan Amirtharajan, Prasad Muralidharan, R. Rajesh, R. Sridevi and J.B.B. Rayappan, 2013. Short Message (Service) as Key for Steganography. Research Journal of Information Technology, 5: 113-124.




Curve Bottom