An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
Text teganography is a method used to hide confidential messages in a message's text without arousing suspicion. This technique has been used in the past, from ancient Greece's scytale tool to modern methods such as Lempel-Ziv-Welch compression and Reflection Symmetry. As digital data cont...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Shaheed Zulfikar Ali Bhutto Institute of Science and Technology
2024-12-01
|
Series: | JISR on Computing |
Subjects: | |
Online Access: | http://jisrc.szabist.edu.pk/ojs/index.php/jisrc/article/view/223 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1823858669761069056 |
---|---|
author | Kisakye Diana Michelle Ocen Gilbert Gilibrays Odongtoo Godfrey |
author_facet | Kisakye Diana Michelle Ocen Gilbert Gilibrays Odongtoo Godfrey |
author_sort | Kisakye Diana Michelle |
collection | DOAJ |
description | Text teganography is a method used to hide confidential messages in a message's text without arousing suspicion. This technique has been used in the past, from ancient Greece's scytale tool to modern methods such as Lempel-Ziv-Welch compression and Reflection Symmetry. As digital data continues to be transmitted between devices, it is vulnerable to attack, making text steganography an essential tool for securing data. Over the years, various techniques have been used to achieve this, including substitution, modification, and embedding techniques. However, text steganography still presents challenges, such as easy detection and the trade-off between hiding capacity and quality of the covered medium. Cryptography has been suggested to improve security by encrypting the original message into a cypher text. However, it cannot withstand the advancements in technology that can break cryptographic methods. Therefore, combining cryptography and steganography is always advisable because steganography increases the security of the carrier message as encryption (Cryptography) provides confidentiality. This study explores the various techniques used in text steganography and the challenges present in them to develop a high hiding capacity, robust, and high-quality covered medium text steganography technique that combines both Steganography and Cryptography using a condition Logic and Secure Hashing algorithm.
|
format | Article |
id | doaj-art-bc058e26057b4ee39ec00a127ed8cf71 |
institution | Kabale University |
issn | 2412-0448 1998-4154 |
language | English |
publishDate | 2024-12-01 |
publisher | Shaheed Zulfikar Ali Bhutto Institute of Science and Technology |
record_format | Article |
series | JISR on Computing |
spelling | doaj-art-bc058e26057b4ee39ec00a127ed8cf712025-02-11T10:35:18ZengShaheed Zulfikar Ali Bhutto Institute of Science and TechnologyJISR on Computing2412-04481998-41542024-12-0122210.31645/JISRC.24.22.2.8An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)Kisakye Diana Michelle0Ocen Gilbert Gilibrays1Odongtoo Godfrey2Faculty of Engineering and Technology Busitema University, Tororo, UgandaFaculty of Engineering and Technology Busitema University, Tororo, UgandaFaculty of Engineering and Technology Busitema University, Tororo, UgandaText teganography is a method used to hide confidential messages in a message's text without arousing suspicion. This technique has been used in the past, from ancient Greece's scytale tool to modern methods such as Lempel-Ziv-Welch compression and Reflection Symmetry. As digital data continues to be transmitted between devices, it is vulnerable to attack, making text steganography an essential tool for securing data. Over the years, various techniques have been used to achieve this, including substitution, modification, and embedding techniques. However, text steganography still presents challenges, such as easy detection and the trade-off between hiding capacity and quality of the covered medium. Cryptography has been suggested to improve security by encrypting the original message into a cypher text. However, it cannot withstand the advancements in technology that can break cryptographic methods. Therefore, combining cryptography and steganography is always advisable because steganography increases the security of the carrier message as encryption (Cryptography) provides confidentiality. This study explores the various techniques used in text steganography and the challenges present in them to develop a high hiding capacity, robust, and high-quality covered medium text steganography technique that combines both Steganography and Cryptography using a condition Logic and Secure Hashing algorithm. http://jisrc.szabist.edu.pk/ojs/index.php/jisrc/article/view/223Information HidingSteganographyCryptographyText SteganographyCover textSecure Hashing Algorithm |
spellingShingle | Kisakye Diana Michelle Ocen Gilbert Gilibrays Odongtoo Godfrey An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3) JISR on Computing Information Hiding Steganography Cryptography Text Steganography Cover text Secure Hashing Algorithm |
title | An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3) |
title_full | An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3) |
title_fullStr | An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3) |
title_full_unstemmed | An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3) |
title_short | An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3) |
title_sort | enhanced text steganography technique sha logic based on conditional logic and sha 3 secure hash algorithm 3 |
topic | Information Hiding Steganography Cryptography Text Steganography Cover text Secure Hashing Algorithm |
url | http://jisrc.szabist.edu.pk/ojs/index.php/jisrc/article/view/223 |
work_keys_str_mv | AT kisakyedianamichelle anenhancedtextsteganographytechniqueshalogicbasedonconditionallogicandsha3securehashalgorithm3 AT ocengilbertgilibrays anenhancedtextsteganographytechniqueshalogicbasedonconditionallogicandsha3securehashalgorithm3 AT odongtoogodfrey anenhancedtextsteganographytechniqueshalogicbasedonconditionallogicandsha3securehashalgorithm3 AT kisakyedianamichelle enhancedtextsteganographytechniqueshalogicbasedonconditionallogicandsha3securehashalgorithm3 AT ocengilbertgilibrays enhancedtextsteganographytechniqueshalogicbasedonconditionallogicandsha3securehashalgorithm3 AT odongtoogodfrey enhancedtextsteganographytechniqueshalogicbasedonconditionallogicandsha3securehashalgorithm3 |