Title: Using different techniques of steganography deducting null cipher in plain text

Authors: Allah Ditta; Cai Yongquan; Khurram Gulzar Rana; Kong Shanshan; Muhammad Azeem; Tahadray Jean

Addresses: College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China ' College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China ' College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China ' College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China ' College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China ' College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China

Abstract: Encoding a message in plain text is an ancient art. Using null cipher (NC) is a great challenge because it requires extensive human efforts and intelligence. In this study, we propose a mechanism which can detect the existence of NC steganography in text without human involvement. We propose a statistical approach based on finding the probability of a ST to generate meaningful words and average word length. A threshhold value (THV) is defined to distinguish the normal data from unusual statistical data. On the basis of the probability and AWL each ST is assigned a risk factor value. Texts exceeding THV will be marked as infected and the remaining as clean text.

Keywords: null cipher steganography; steg-text; steganalysis; probability; advance analysis; plain text; meaningful words; average word length; threshhold value; risk factor; security.

DOI: 10.1504/IJWMC.2015.074050

International Journal of Wireless and Mobile Computing, 2015 Vol.9 No.4, pp.317 - 324

Received: 11 Jul 2015
Accepted: 02 Aug 2015

Published online: 03 Jan 2016 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article