Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Analysis of Natural Language Steganography
Shaifizat Mansor, Roshidi bin Din, Azman Samsudin
Pages - 113 - 125 | Revised - 05-05-2009 | Published - 18-05-2009
MORE INFORMATION
KEYWORDS
Steganography, Text Steganography, Secret Message, Software Metric
ABSTRACT
The technology of information hiding through an open network has developed rapidly in recent years. One of the reasons why we need tools to hide message, is to keep secret message concealed from unauthorized party. Steganography is one of the techniques in sending secret message. In this paper, several software metrics were used to analyze the common criteria in steganographic tools and measure the complexity of the tools in hiding message. Several criterias have been chosen: Percent Lines with Comments (PLwC); Average Statements per Function (ASpF) and Average Block Depth (ABD) to measure the tools complexity. The analysis process has been implemented using a single Linux platform.
1 | Ogilvie, R., & Weir, G. R. (2012). Genre-based information hiding. In Global Security, Safety and Sustainability & e-Democracy (pp. 104-111). Springer Berlin Heidelberg. |
2 | Ananthi, S., & Anjanadevi, A. (2012). Reversible Image Data Hiding Using Predictive Coding Technique Based on Steganograpic Scheme. International Journal of Engineering and Innovative Technology (IJEIT) Volume, 2. |
3 | S. Ortolani, M. Conti and B. Crispo, “Censorship-Resilient Communications Through Information Scattering”, in Proceedings of the 18th International Workshop on Security Protocols (IWSP 2010), Cambridge, UK, March 24-26, 2010. |
4 | Miao Haibo , Liu Sheng Huang , Chen Zhili , & Yang Wei . ( 2010 ) . For text analysis and detection of hidden tools Stegparty . COMMUNICATIONS , (9A), 37-258. |
A. Westfield, A. Pfitzmann. “Attacks on steganographic systems”. In Proceedings of 3rd International Workshop Computer Science (IH '99) Germany, 1999 | |
B. V. Dhandra, and M. Hangarge. “Morphological reconstruction for word level script identification”. International Journal of Computer Science and Security (IJCSS), Computer Science Journal Press, 1(1): 41 - 51, May/June 2007 | |
B. V. Dhandra, and M. Hangarge. “Morphological reconstruction for word level script identification”. International Journal of Computer Science and Security (IJCSS), Computer Science Journal Press, 1(1): 41 - 51, May/June 2007 | |
C. Johns. Applied Software Measurement (3rd Edition). USA, 2008 | |
C. Kant, R. Nath, and S. Chaudhary. “Biometrics security using steganography”. International Journal of Security (IJS), Computer Science Journal Press, 2(1): 1 - 5, Jan/Feb 2008 | |
D. Welzel, H. L. Hausen. “A five steps method for metric-based software evaluation: effective software metrication with respect to quality standard”. Journal of ACM, 39(2 –5):273 – 276, 1993 | |
F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn. “Information hiding: A survey”. In Proceedings of the IEEE on Protection of Multimedia Content, 87(7):1062 - 1078, July 1999 | |
FFEncode can be accessed at; http://www.rugeley.demon.co.uk/security/ffencode.zip | |
J. J. Eggers, R. Bäuml, and B. Girod. “A communications approach to image steganography”. In Proceedings of SPIE: Electronic Imaging, Security and Watermarking of Multimedia Contents IV, 4675:26-37, San Jose, CA, USA, January 2002 | |
J. Walker. “Steganosaurus”. 1997, http://www.fourmilab.ch/ or http://www.fourmilab.to/stego/ | |
J. Zollner, H. Federrath, H. Klimant, A. Pritzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf. “Modeling the security of steganographic systems”. In 2nd International Workshop Information Hiding. Springer, Berlin/Heidelberg, German, vol. 1525: 345 - 255, 1998 | |
K. Maher. “Texto”. Underware Software Production Ltd. Inc.,1995, http://linkbeat.com/files/ | |
K. Ochiawai, H. Iwasaki, J. Naganuma, M. Endo, and T. Ogura. “High Speed Software-based Platform for Embedded Softwar of A Single-Chip MPEG-2 Video Encoder LSI with HDTV Scalibility”. In Proceeding of the Conference on Design, Automation and Test in Europe: 1-6, 1999 | |
M. A. A. Murad, and T. Martin. “Similarity-based estimation for document summarization using Fuzzy sets”. International Journal of Computer Science and Security (IJCSS), Computer Science Journal Press, Kuala Lumpur, 1(4): 1 - 12, Nov/Dec 2007 | |
M. A. A. Murad, and T. Martin. “Similarity-based estimation for document summarization using Fuzzy sets”. International Journal of Computer Science and Security (IJCSS), Computer Science Journal Press, Kuala Lumpur, 1(4): 1 - 12, Nov/Dec 2007 | |
M. Chapman, G. I. Davida, and M. Rennhard. “A practical and effective approach to largescale automated linguistic steganography”. In Proceedings of the Information Security Conference (ISC '01), Malaga, Spain, 156 -165, October 2001 | |
M. Kharrazi, H. T. Sencar, Memon. “Benchmarking steganographic and steganalysis techniques” Security, Steganography, and Watermarking of Multimedia Contents, 2005 | |
M. Kwan. “SNOW”. Darkside Technologies Pty Ltd ACN 082 444 246 Australia, 1998 http://www.darkside.com.au/snow/index.html | |
METRIC DATA PROGRAM can be accessed at http://mdp.ivv.nasa.gov/loc_metrics.html#PERCENT_COMMENTS | |
Metrics Complexity can be accessed at http://download.instantiatons.com/CodeProDoc | |
N. F. Johnson, S. Jajodia. “Exploring steganography: seeing the unseen”. IEEE Computer Magazine, 31(2):26 – 34, 1998 | |
PGPn123 can be accessed at; ftp://ftp.dei.uc.pt/pub/pgp/pc/windows/ | |
R. P. Cook. “An introduction to modular programming”, 1995 from http://www.docdubya.com/belvedere/cpp/modular.html | |
S. E. Hugg. “StegParty”. Hamco Software (COMETBUSTERS-DOM) 1249 Turkey Point Rd Edgewater, MD 21037 US, 1999 http://www.cometbusters.com/hugg/projects/stegparty.html | |
S. Nystedt, C. Sandros. “Software Complexity and Project Performance”. Master Thesis and Bachelor Thesis, University of Gothenburg, 1999 | |
S. R. Baragada, M. S. Rao, S. Purushothaman, and S. Ramakrishna. “Implementation of radial basis function neural network for image steganalysis”. International Journal of Computer Science and Security (IJCSS), Computer Science Journal Press, Kuala Lumpur, 1(4): 12 - 22, Jan/Feb 2008 | |
Snowdrop can be accessed at; http://linux.softpedia.com/get/Programming/Version- Control/snowdrop-23917.shtml | |
Steganos can be accessed at; http://zerblatt.forex.ee/~ftp/crypto/code/STEGANOS.ZIP | |
Z. Oplatkova, J. Holoska, I. Zelinka, and R. Senkerik. “Steganography Detection by Means of Neural Networks”. 19th International Conference on Database and Expert Systems Application (DEXA ’08), 2008 | |
Mr. Shaifizat Mansor
- Malaysia
Mr. Roshidi bin Din
- Malaysia
roshidi@uum.edu.my
Mr. Azman Samsudin
- Malaysia
|
|
|
|
View all special issues >> | |
|
|