Int. J. of Wireless and Mobile Computing   »   2015 Vol.9, No.4

 

 

Title: Using different techniques of steganography deducting null cipher in plain text

 

Authors: Allah Ditta; Cai Yongquan; Khurram Gulzar Rana; Kong Shanshan; Muhammad Azeem; Tahadray Jean

 

Addresses:
College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China
College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China
College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China
College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China
College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China
College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China

 

Abstract: Encoding a message in plain text is an ancient art. Using null cipher (NC) is a great challenge because it requires extensive human efforts and intelligence. In this study, we propose a mechanism which can detect the existence of NC steganography in text without human involvement. We propose a statistical approach based on finding the probability of a ST to generate meaningful words and average word length. A threshhold value (THV) is defined to distinguish the normal data from unusual statistical data. On the basis of the probability and AWL each ST is assigned a risk factor value. Texts exceeding THV will be marked as infected and the remaining as clean text.

 

Keywords: null cipher steganography; steg-text; steganalysis; probability; advance analysis; plain text; meaningful words; average word length; threshhold value; risk factor; security.

 

DOI: 10.1504/IJWMC.2015.074050

 

Int. J. of Wireless and Mobile Computing, 2015 Vol.9, No.4, pp.317 - 324

 

Submission date: 10 Jul 2015
Date of acceptance: 02 Aug 2015
Available online: 02 Jan 2016

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article