Steganography is helping individuals to send private information between two gatherings. It empowers client to conceal information in various advanced mediums. Steganography is of numerous kinds, for example, picture steganography, content steganography, sound/video steganography and so on. Content Steganography is very troublesome than different strategies as a result of less measure of repetition and changes can be distinguished effectively. A portion of the systems of content steganography has been talked alongside attributes and working on it. Sending scrambled messages habitually will draw the consideration of outsiders, i.e. wafers and programmers, maybe making endeavors who break and uncover the first messages. A New approach is proposed in data concealing utilizing between word break up and between passages separating as a cross breed technique. Our strategy offers dynamic created stego-content with six alternatives of most extreme limit as indicated by secrecy message length. This paper additionally broke down the noteworthy disadvantages of each current strategy and how the proposed method resolves such issues.
steganography, hiding text, text steganography, hiding techniques, randomized techniques
Agarwal M. (2013). Text steganographic approaches: A comparison. International Journal of Network Security & Its Applications (IJNSA), Vol. 5, No. 1, pp. 91-106. https://doi.org/10.5121/ijnsa.2013.5107
Ali A. A. (2013). New Text Steganography Technique by using Mixed-Case Font. International Journal of Computer Applications, Vol. 62, No. 3, pp. 6-9.
Alla K., Prasad S. R., Ram S. (2008). A novel Hindi text steganography using letter diacritics and its compound words. International Journal of Computer Science and Network Security, Vol. 8, No. 12, pp. 404-409.
Bennett K. (2004). Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text. Citeseer. https://doi.org/10.1.1.158.8602
Dhanani C., Panchal K. (2013). Steganography using web documents as a carrier: A survey. International Journal of Engineering Development and Research. https://doi.org/10.11241/ijedr.21412
Garg M. (2011). A novel text steganography technique based on html documents. International Journal of Advanced Science and Technology, Vol. 35, pp. 129-138.
Gupta S., Gupta D. (2011). Text-steganography: Review study & comparative analysis. International Journal of Computer Science and Information Technologies, Vol. 2, No. 5. https://doi.org/10.21421/ijcsit.11421
Gutub A., Fattani M. (2007). A Novel Arabic Text Steganography Method Using Letter Points and Extensions.
Kingslin S., Kavitha N. (2015). Evaluative approach towards text steganographic techniques. Indian Journal of Science and Technology, Vol. 8, No. 29. https://doi.org/10.17485/ijst/2015/v8i29/84415
Low S. H., Maxemchuk N. F., Brassil J. T., O'Gorman L. (1995). Document marking and identification using both line and word shifting. Proceedings of INFOCOM'95. https://doi.org/10.1109/INFCOM.1995.515956
Memon J. A., Khowaja K., Kazi H. (2008). Evaluation of steganography for Urdu/Arabic text. Journal of Theoretical and Applied Information Technology, pp. 232-237.
Popa R. (1998). An analysis of steganographic techniques. The Politehnica University of Timisoara, Faculty of Automatics and Computers.
Por L. Y., Ang T. F., Delina B. (2008). WhiteSteg- a new scheme in information hiding using text steganography. Transactions on Computers, Vol. 7, No. 6, pp. 735-745.
Rani N., Chaudhary J. (2013). Text steganography techniques: A review. International Journal of Engineering Trends and Technology, Vol. 4, No. 7, pp. 3013-3015.
Shahreza M. S. (2005). A new method for steganography in HTML files. Advances in Computer, Information, and Systems Sciences, and Engineering, pp. 247-252. https://doi.org/10.1007/1-4020-5261-8_39
Sharma V., Kumar S. (2013). A new approach to hide text in images using steganography. International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 4, pp. 701-708.
Singh P., Chaudhary R., Agarwal A. (2012). A novel approach of text steganography based on null spaces. IOSR Journal of Computer Engineering, Vol. 3, No. 4, pp. 11-17.