CFP last date
22 April 2024
Reseach Article

Enhancing Open Space Method in Data Hiding Technique

by Hebah H. O. Nasereddin, Yaman F. Abdullah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 155 - Number 7
Year of Publication: 2016
Authors: Hebah H. O. Nasereddin, Yaman F. Abdullah
10.5120/ijca2016912103

Hebah H. O. Nasereddin, Yaman F. Abdullah . Enhancing Open Space Method in Data Hiding Technique. International Journal of Computer Applications. 155, 7 ( Dec 2016), 5-17. DOI=10.5120/ijca2016912103

@article{ 10.5120/ijca2016912103,
author = { Hebah H. O. Nasereddin, Yaman F. Abdullah },
title = { Enhancing Open Space Method in Data Hiding Technique },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 155 },
number = { 7 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 5-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume155/number7/26615-2016912103/ },
doi = { 10.5120/ijca2016912103 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:00:37.478085+05:30
%A Hebah H. O. Nasereddin
%A Yaman F. Abdullah
%T Enhancing Open Space Method in Data Hiding Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 155
%N 7
%P 5-17
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This research studies a methodology for hide data within different texts. That is where the data masking process is one of the areas of information security to hide and encrypt data and other branches that represent information security. The process of hiding data within the text are completely different from the rest of methods of concealment, it will be through a change in the empty spaces in the text or change the text itself or change in some of the properties other than text and empty spaces. These changes are a way by which to hide data within the text. This research proposes an enhancement of white space method for hiding data, which is processed by changing the secret text through extracting the indexes of the characters from the cover text or ASCII code, then converting these numbers from the decimal numeral system into the octal numeral system in order to use the number 8 and 9 as indicators against the remaining numbers. Then, merge these outcomes with the white spaces between the words in the cover text by changing the font size of these numbers to 1pt, and changing the font color to match background color of the cover text.

References
  1. Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM SYSTEMS JOURNAL, 313-336.
  2. YILMAZ, A. (2003). ROBUST VIDEO TRANSMISSION USING DATA HIDING. In partial fulfillment of the requirements for the degree of Master of Science, the graduate school of natural and applied sciences of the Middle East technical university, 20-30.
  3. Hebah H. O. Nasereddin., & Al Farzaeai, M. S. (2010)., PROPOSED DATA HIDING TECHNIQUE TEXT IMAGE INSIDE IMAGE (TIII). ,International Journal of Research and Reviews in Applied Sciences, 183- 193.
  4. Ibrahim, A., & Zabian, A. (2009). Algorithm for Text Hiding in Digital Image for Information Security. International Journal of Computer Science and Network Security, 262-268.
  5. Abdullah, Y. F., & Hebah H. O. Nasereddin (2013). Proposed Data Hiding Technique – Text under Text. American Academic & Scholarly Research Journal (AASRJ), 243-248.
  6. Por, L. Y., Wong, K., & Chee, K. O. (2012). A text-based data hiding method using Unicode space characters. The Journal of Systems and Software, 1075 – 1082.
  7. Rahma, A. S., AbdulWahab, H. B., & Al-Noori, A. Y. (2011). Proposed Steganographic Method for Data Hiding in Microsoft Word Documents Structure. Al-Mansour Journal, 1 - 29.
  8. Vill´an, R., Voloshynovskiy, S., Koval, O., Vila, J., Topak, E., Deguillaume, F., et al. (2006). Text Data-Hiding for Digital and Printed Documents: Theoretical and Practical Considerations. Stochastic Information Processing (SIP), 15-26.
  9. wikipedia. (2013, March 08). Point (typography). Retrieved May 02, 2013, from Wikipedia, the free encyclopedia: http://en.wikipedia.org/wiki/Point_(typography)
  10. wikipedia. (2013, April 30). Sentence spacing. Retrieved May 02, 2013, from Wikipedia, the free encyclopedia: http://en.wikipedia.org/wiki/Sentence_spacing
  11. Jebran, A. (2007, June 19). Text 2Text Steganography - Part 2. Retrieved January 6, 2013, from Code Project:http://www .codeproject.com/Articles/19260/Text- 2Text-Steganography-Part-2
  12. Imad S. W. Khufash, Hebah H. O. Nasereddin , International Journal of Advanced Research in Computer Science and Software Engineering International Journal of Advanced Research in Computer Science and Software EngineeringVolume 5, Issue 11,November 2015 Pp 672-677
  13. Ahmed Faleh , Hebah H. O. Nasereddin , New Method for Image Inside Image Steganography, Master Degree in Computer Science. Faculty of Information Technology Middle East University
  14. Muataz Safauldeen Abdulrahman, Hebah H. O. Nasereddin, New .Technique to Embed Encrypted QR Code in Colored Image by Using First and Third LSB ,Master Degree in Computer Science .Faculty of Information Technology Middle East University
Index Terms

Computer Science
Information Sciences

Keywords

steganography host signal signal encoder white space syntactic semantic Microsoft Word UniSpaCh justified format secret text and cover text.