CFP last date
22 April 2024
Reseach Article

A Review for Text Steganography Techniques for WSN

Published on February 2017 by Reetika Sodhi
National Conference on Latest Initiatives and Innovations in Communication and Electronics
Foundation of Computer Science USA
IICE2016 - Number 1
February 2017
Authors: Reetika Sodhi
4ef5d8a2-7235-4f90-93ed-04e67e53addf

Reetika Sodhi . A Review for Text Steganography Techniques for WSN. National Conference on Latest Initiatives and Innovations in Communication and Electronics. IICE2016, 1 (February 2017), 5-8.

@article{
author = { Reetika Sodhi },
title = { A Review for Text Steganography Techniques for WSN },
journal = { National Conference on Latest Initiatives and Innovations in Communication and Electronics },
issue_date = { February 2017 },
volume = { IICE2016 },
number = { 1 },
month = { February },
year = { 2017 },
issn = 0975-8887,
pages = { 5-8 },
numpages = 4,
url = { /proceedings/iice2016/number1/26947-1654/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Latest Initiatives and Innovations in Communication and Electronics
%A Reetika Sodhi
%T A Review for Text Steganography Techniques for WSN
%J National Conference on Latest Initiatives and Innovations in Communication and Electronics
%@ 0975-8887
%V IICE2016
%N 1
%P 5-8
%D 2017
%I International Journal of Computer Applications
Abstract

In today's digitised era almost all data is transferred digitally which is very easy and advantageous but it also has some shortcomings i. e. the security of this data is very important. So different techniques such as steganography and cryptography are used to ensure security of data being sent over a medium. In steganography, the secret data is concealed within an object known as cover media which can be an image, audio/video, text so that the existence of any hidden data is not known to the third party or anyone who is not the intended receiver of that data. So in this paper discussion on some text steganography techniques is done with their merits and demerits.

References
  1. Amirtharajan, R. , and Rayappan, J. B. B. 2012. An intelligent chaotic embedding approach to enhance stego-image Quality.
  2. Mehta,A. M. , Lanzisera,S. , and Pister, K. S. J. 2009. Steganography in 802. 15. 4 Wireless Communication.
  3. Uddin, M. P. , Saha,M. ,Ferdousi,S. J. , Afjal,M. I. , and Marjan, M. A. 2014. Developing an efficient solution to information hiding through text steganography along with cryptography.
  4. Nagarhalli, T. P. 2015. A New Approach to Text Steganography Using Adjectives.
  5. Perrig,A. , Stankovic,J. , and Wagner,D. 2004. Security in wireless sensor networks. .
  6. Garg,M. 2011. A Novel Text Steganography Technique Based on Html Documents.
  7. Singh,P. ,Chaudhary,R. ,and Agarwal,A. 2012. A Novel Approach of Text Steganography based on null spaces.
  8. Kumar,K. A. ,Pabboju,S. ,andDesai,N. M. S. 2014. Advanvced text steganography algorithms: An overview
  9. Jassim,F. A. 2013. A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method.
  10. Sharma,G. ,Bala,S. ,and Verma,A. K. 2012. Security frameworks for wireless sensor networks-review.
  11. Modi,R. P. ,Nimbalkar,M. V. ,andPathak,G. R. 2011. Dynamic cryptographic techniques for wireless sensor networks.
  12. Peak Signal-to-Noise Ratio as an Image Quality Metric. 2013. [Online]. Available: www. ni. com,
  13. Introduction to Steganography. [Online]. Available: Revised. 2009.
  14. Gupta, S. ,and Gupta, D. 2011. TextSteganography:Review Study & Comparative Analysis.
  15. Kaur,A. ,Kaur,R. , and Kumar,N. 2015. A Review on Image Steganography Techniques.
Index Terms

Computer Science
Information Sciences

Keywords

Wsn Steganography Cryptography