An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)

Text teganography is a method used to hide confidential messages in a message's text without arousing suspicion. This technique has been used in the past, from ancient Greece's scytale tool to modern methods such as Lempel-Ziv-Welch compression and Reflection Symmetry. As digital data cont...

Full description

Saved in:
Bibliographic Details
Main Authors: Kisakye Diana Michelle, Ocen Gilbert Gilibrays, Odongtoo Godfrey
Format: Article
Language:English
Published: Shaheed Zulfikar Ali Bhutto Institute of Science and Technology 2024-12-01
Series:JISR on Computing
Subjects:
Online Access:http://jisrc.szabist.edu.pk/ojs/index.php/jisrc/article/view/223
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1823858669761069056
author Kisakye Diana Michelle
Ocen Gilbert Gilibrays
Odongtoo Godfrey
author_facet Kisakye Diana Michelle
Ocen Gilbert Gilibrays
Odongtoo Godfrey
author_sort Kisakye Diana Michelle
collection DOAJ
description Text teganography is a method used to hide confidential messages in a message's text without arousing suspicion. This technique has been used in the past, from ancient Greece's scytale tool to modern methods such as Lempel-Ziv-Welch compression and Reflection Symmetry. As digital data continues to be transmitted between devices, it is vulnerable to attack, making text steganography an essential tool for securing data. Over the years, various techniques have been used to achieve this, including substitution, modification, and embedding techniques. However, text steganography still presents challenges, such as easy detection and the trade-off between hiding capacity and quality of the covered medium. Cryptography has been suggested to improve security by encrypting the original message into a cypher text. However, it cannot withstand the advancements in technology that can break cryptographic methods. Therefore, combining cryptography and steganography is always advisable because steganography increases the security of the carrier message as encryption (Cryptography) provides confidentiality. This study explores the various techniques used in text steganography and the challenges present in them to develop a high hiding capacity, robust, and high-quality covered medium text steganography technique that combines both Steganography and Cryptography using a condition Logic and Secure Hashing algorithm.
format Article
id doaj-art-bc058e26057b4ee39ec00a127ed8cf71
institution Kabale University
issn 2412-0448
1998-4154
language English
publishDate 2024-12-01
publisher Shaheed Zulfikar Ali Bhutto Institute of Science and Technology
record_format Article
series JISR on Computing
spelling doaj-art-bc058e26057b4ee39ec00a127ed8cf712025-02-11T10:35:18ZengShaheed Zulfikar Ali Bhutto Institute of Science and TechnologyJISR on Computing2412-04481998-41542024-12-0122210.31645/JISRC.24.22.2.8An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)Kisakye Diana Michelle0Ocen Gilbert Gilibrays1Odongtoo Godfrey2Faculty of Engineering and Technology Busitema University, Tororo, UgandaFaculty of Engineering and Technology Busitema University, Tororo, UgandaFaculty of Engineering and Technology Busitema University, Tororo, UgandaText teganography is a method used to hide confidential messages in a message's text without arousing suspicion. This technique has been used in the past, from ancient Greece's scytale tool to modern methods such as Lempel-Ziv-Welch compression and Reflection Symmetry. As digital data continues to be transmitted between devices, it is vulnerable to attack, making text steganography an essential tool for securing data. Over the years, various techniques have been used to achieve this, including substitution, modification, and embedding techniques. However, text steganography still presents challenges, such as easy detection and the trade-off between hiding capacity and quality of the covered medium. Cryptography has been suggested to improve security by encrypting the original message into a cypher text. However, it cannot withstand the advancements in technology that can break cryptographic methods. Therefore, combining cryptography and steganography is always advisable because steganography increases the security of the carrier message as encryption (Cryptography) provides confidentiality. This study explores the various techniques used in text steganography and the challenges present in them to develop a high hiding capacity, robust, and high-quality covered medium text steganography technique that combines both Steganography and Cryptography using a condition Logic and Secure Hashing algorithm. http://jisrc.szabist.edu.pk/ojs/index.php/jisrc/article/view/223Information HidingSteganographyCryptographyText SteganographyCover textSecure Hashing Algorithm
spellingShingle Kisakye Diana Michelle
Ocen Gilbert Gilibrays
Odongtoo Godfrey
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
JISR on Computing
Information Hiding
Steganography
Cryptography
Text Steganography
Cover text
Secure Hashing Algorithm
title An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
title_full An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
title_fullStr An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
title_full_unstemmed An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
title_short An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
title_sort enhanced text steganography technique sha logic based on conditional logic and sha 3 secure hash algorithm 3
topic Information Hiding
Steganography
Cryptography
Text Steganography
Cover text
Secure Hashing Algorithm
url http://jisrc.szabist.edu.pk/ojs/index.php/jisrc/article/view/223
work_keys_str_mv AT kisakyedianamichelle anenhancedtextsteganographytechniqueshalogicbasedonconditionallogicandsha3securehashalgorithm3
AT ocengilbertgilibrays anenhancedtextsteganographytechniqueshalogicbasedonconditionallogicandsha3securehashalgorithm3
AT odongtoogodfrey anenhancedtextsteganographytechniqueshalogicbasedonconditionallogicandsha3securehashalgorithm3
AT kisakyedianamichelle enhancedtextsteganographytechniqueshalogicbasedonconditionallogicandsha3securehashalgorithm3
AT ocengilbertgilibrays enhancedtextsteganographytechniqueshalogicbasedonconditionallogicandsha3securehashalgorithm3
AT odongtoogodfrey enhancedtextsteganographytechniqueshalogicbasedonconditionallogicandsha3securehashalgorithm3