A Comparative Result Analysis of Text Based SteganographicApproaches
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Today in this digital era everything (data) can be digitized and can be transmitted over thecommunication networks. But not withstanding with this advantage it also has a downside i.e. the digitized datacan be easily accessed illegally, it can be tampered with and copy. The issue of providing security to theinformation has become increasingly important with the development of computer and expanding its use indifferent areas of one's life and work[4]. One of the grounds discussed in information security is the exchange ofinformation through the cover media. In this, different methods such as cryptography, steganography, etc., havebeen used. Many approaches were introduced for making the data secure. But the efficient utilization of those approaches isn’t defined i.e. which approach to be used according to the situations. This paper implements fiveapproaches of Text Steganography to compare their Time and Space complexities by from considering threeText Steganography algorithms from the study of Monika Agarwal's paper entitled "Text SteganographicApproaches :A Comparison"[1] and bring out the comparative results of algorithm for some particular secrettext. The results of the comparisons are shown in form of bar charts and pie charts.
Authors and Affiliations
K. Aditya Kumar Prof. Suresh Pabboju
Secure and Efficient Key Management Scheme in MANETs
Abstract: InMobile ad hoc networks (MANETs) security has become a primary requirements. Thecharacteristics capabilities of MANETsexposeboth challenges and opportunities in achieving key security goals,such as confidentia...
Prevention of Discrimination in Data Mining
Data mining is the process of analyzing data from different perspectives and summarizing it into useful information. Automated data collection allows users to analyze data from many different dimensions or angles...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Networks
While routing Wireless Sensor nodes in the Multi-hop network ,nodes may undergo some attacks such as sink hole attack, worm hole attack, Sybil attack etc., by the attackers through identity deception. So, to &n...
Reliable SPIN in Wireless Sensor Network: A Review
Abstract: Wireless sensor network (WSN) is becoming famous because of its use in various applications of different areas such as environment, defense, medical, house, media and education. WSN is a structure free ne...
Cloud for Big Data Analytics Trends
Abstract. Cloud can provide infrastructure, platform, and software resources as services to big data. Big Data gives substantial value to organizations who implement cloud in their infrastructure. Big data and cloud tech...