Using different techniques of steganography deducting null cipher in plain text
by Allah Ditta; Cai Yongquan; Khurram Gulzar Rana; Kong Shanshan; Muhammad Azeem; Tahadray Jean
International Journal of Wireless and Mobile Computing (IJWMC), Vol. 9, No. 4, 2015

Abstract: Encoding a message in plain text is an ancient art. Using null cipher (NC) is a great challenge because it requires extensive human efforts and intelligence. In this study, we propose a mechanism which can detect the existence of NC steganography in text without human involvement. We propose a statistical approach based on finding the probability of a ST to generate meaningful words and average word length. A threshhold value (THV) is defined to distinguish the normal data from unusual statistical data. On the basis of the probability and AWL each ST is assigned a risk factor value. Texts exceeding THV will be marked as infected and the remaining as clean text.

Online publication date: Sun, 03-Jan-2016

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Wireless and Mobile Computing (IJWMC):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com