Title: A cryptographic data hiding algorithm with high cover text capacity

Authors: Muhammad Azeem; Jingsha He; Khurram Gulzar Rana; Faheem Akhtar

Addresses: Faculty of Information Science and Technology, College of Computer Science and Technology, Beijing University of Technology, Beijing, 100124, China ' Faculty of Information Science and Technology, College of Software Engineering, Beijing University of Technology, Beijing, 100124, China ' Institute of Information Technology, Quaid-i-Azam University Islamabad, Islamabad, 44000, Pakistan ' Department of Computer Science, Sukkur Institution of Business Administration (SIBA), Sukkur, 65200, Pakistan

Abstract: Cryptography and steganography are foremost techniques used to ensure security and confidentiality of secret information. In steganography, data hiding capacity with security is a great challenge for the researchers. In present scheme, a novel approach with combination of steganography and cryptography is proposed to achieve high data hiding capacity with greater security. To accomplish this goal, three level encryption is applied to hide secret message by using bit complement and bit right rotation. Different Unicode characters such as zero width non-joiner (ZWNJ), zero width joiner (ZWJ) and zero width character (ZWC), are used to conceal secret information into English cover text. To embed secret data into cover text, firstly, algorithm implements three level encryption on confidential data and then resulting binary is embedded into cover text by using Unicode characters. The results revealed that recently designed algorithm has higher data security due to light weight and efficient encryption mechanism along with 2-bit/char cover text capacity. Moreover, there is no overhead of secret key generation and exchange from source to destination. Projected technique is easy to implement, hard to break and reduces intruder's attention.

Keywords: information control; Unicode; cryptography; bit rotation; cover media; text steganography.

DOI: 10.1504/IJESDF.2019.10016326

International Journal of Electronic Security and Digital Forensics, 2019 Vol.11 No.2, pp.225 - 244

Received: 11 May 2018
Accepted: 03 Jul 2018

Published online: 02 Apr 2019 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article