Steganography Method for Hiding Data In The Name_Field of A List of Names Created by Microsoft Word

Authors

  • Amosa Babalola  Department of Computer Science, Federal Polytechnic, Ede, Nigeria
  • Longe Oluwaseun  Department of Computer Science, Federal Polytechnic, Ede, Nigeria
  • Onyeka Ndidi  Department of Computer Science, Federal Polytechnic, Ede, Nigeria
  • Oluwatosin Adefunke  Department of Computer Science, Federal Polytechnic, Ede, Nigeria

Keywords:

Steganography, Unused Blocks, Retrieval, Microsoft Word.

Abstract

This work presents a new algorithm to hide data inside data inside the name_field of a list of names created by Microsoft Word using steganography technique. The algorithm was designed to hide the data inputted within a record of a list of names created by Microsoft word so as to protect the privacy of the data. The system uses three algorithms namely: Algorithm-1 to search for the unused block/spaces in a record of list of names. Algorithm-2: to hide data in the unused blocks/spaces and Algorithm-3: to extract the hidden data. When the algorithms were tested with a few list of names created by Microsoft Word, it was discovered that the records with the hidden data in Microsoft Word do not have a noticeable distortion on it (as seen by the naked eyes). It was also tested using PSNR value, based on these, the PSNR value of each of the list of names created by Microsoft word has a higher PSNR value.

References

  1. Shaff.k, sankar, narayanan, prashanth," A Novel Audio Steganography Scheme using Amplitude Differencing ", IEEE Xplore, ISBN: 978-1-4244-9008- 0 vol.10, pp: 163-167, 2011.
  2. M. Chen, N. Memon, E.K. Wong, Data hiding in document images, in: H. Nemati (Ed.). Premier Reference Source–Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York: Information Science Reference, 2008, pp. 438-450.
  3. D.C. Lou, J.L. Liu, H.K. Tso, Evolution of information – hiding technology, in H. Nemati (Ed.), Premier Reference Source–Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York: Information Science Reference, 2008, pp. 438-450.
  4. Schneider, Secrets & Lies, Indiana:Wiley Publishing, 2000.
  5. S. Bhavana and K. L. Sudha. Text Steganography Using LSB Insertion Method Along with Chaos Theory. International Journal of Computer Science, Engineering and Applications (IJCSEA), Vol.2, No.2, pp. 145-149, April 2012.
  6. Nameer N. El-Emam, Rasheed Abdul Shaheed Al-Zubidy. New Steganography Algorithm to Conceal a Large Amount of Secret Message Using Hybrid Adaptive Neural Networks with Modified Adaptive Genetic Algorithm. Journal of Systems and Software, Vol. 86, Issue 6, pp. 1465-1481, June 2013.
  7. O. Kurtuldu and N Arica. A New Steganography Method Using Image Layers. Proceedings of the 23rd International Symposium on Computer and Information Sciences (ISCIS '08), pp. 1-4, Istanbul, Turkey, 27-29 October 2008.
  8. A. M. Fard, M. M. R. Akbarzadeh-T, and F. Varasteh-A. A New Genetic Algorithm Approach for Secure JPEG Steganography. Proceedings of the IEEE International Conference on Engineering of Intelligent Systems, pp. 1-6, Islamabad, Pakistan, 2006.
  9. G. R. Xuan, Y. Q. Shi, J. J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen, and W. Chenl. Steganalysis based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. Proceedings of the 7th International Information Hiding Workshop, LNCS, Vol. 3727, pp. 262-277, Springer-Verlag, 2010
  10. Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal, Data Hiding Through Multi Level Steganography and SSCE, Journal of Global Sujay Narayana and Gaurav Prasad. Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions. The International Journal of Signal & Image Processing (SIPIJ), Vol.1, No.2, pp. 60-73, December 2011.
  11. M. H. S. Shahreza, and M. S. Shahreza, ”A new approach to Persian/Arabic text steganography,” In Proceedings of 5th IEEE/ACIS Int. Conf. on Computer and Information Science and 1st IEEE/ACIS Int. Workshop on Component-Based Software Engineering, Software Architecture and Reuse, 2006, pp. 310-315.
  12. S. H. Low, N. F. Maxemchuk, J. T. Brassil, and L. O. Gorman, “Document marking and identification using both line and word shifting,” INFOCOM’95 Proceedings of the Fourteenth Annual Joint Conf. of the IEEE Computer and Communication Societies, 1995, pp. 853-860.
  13. J. Cummins, P. Diskin, S. Lau, and R. Parlett, “Steganography and digital watermarking,” School of Computer Science, 2004, pp.1-24.
  14. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol.35, pp. 313-336, 1996.
  15. I. Banerjee, S. Bhattacharyya, and G. Sanyal, “Novel text steganography through special code generation,” Int. Conf. on Systemics, Cybernetics and Informatics, 2011, pp. 298-303. Information," in Proc. IEEE Information Technology Conf., Syracuse, NY, Sep.1998, pp.113-116.
  16. T. Y. Liu, and W. H. Tsai, “A new steganographic method for data hiding in Microsoft word documents by a change tracking technique,” IEEE Transactions on Information Forensics and Security, vol.2, no.1, pp. 24-30, 2007.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Amosa Babalola, Longe Oluwaseun, Onyeka Ndidi, Oluwatosin Adefunke, " Steganography Method for Hiding Data In The Name_Field of A List of Names Created by Microsoft Word , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1852-1857, January-February-2018.