Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
An Approach of Quantum Steganography through Special SSCE Code
Authors: Indradip Banerjee, Souvik Bhattacharyya, Gautam Sanyal
Abstract:
Encrypted messages sending frequently draws the attention of third parties, perhaps causing attempts to break and reveal the original messages. Steganography is introduced to hide the existence of the communication by concealing a secret message in an appropriate carrier like text, image, audio or video. Quantum steganography where the sender (Alice) embeds her steganographic information into the cover and sends it to the receiver (Bob) over a communication channel. Alice and Bob share an algorithm and hide quantum information in the cover. An eavesdropper (Eve) without access to the algorithm can-t find out the existence of the quantum message. In this paper, a text quantum steganography technique based on the use of indefinite articles (a) or (an) in conjunction with the nonspecific or non-particular nouns in English language and quantum gate truth table have been proposed. The authors also introduced a new code representation technique (SSCE - Secret Steganography Code for Embedding) at both ends in order to achieve high level of security. Before the embedding operation each character of the secret message has been converted to SSCE Value and then embeds to cover text. Finally stego text is formed and transmits to the receiver side. At the receiver side different reverse operation has been carried out to get back the original information.Keywords: Quantum Steganography, SSCE (Secret SteganographyCode for Embedding), Security, Cover Text, Stego Text.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1077673
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2110References:
[1] Correlation and dependence.
[Online]. Available: http : //en.wikipedia.org/wiki/Correlationanddependence.
[2] Spy gadgets in world war ii: Microdots, 2007. http://www.mi5.gov.uk/output/Page303.html, Feb. 15, 2008.
[3] Dr. Mohammed Al-Mualla and Prof. Hussain Al-Ahmad. Information hiding: Steganography and watermarking.
[Online]. Available: http : //www.emirates.org/ieee/informationhiding.pdf..
[4] Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography. IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright and Privacy Protection, 16:474-481, 1998.
[5] K. Bennett. Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text. Purdue University, CERIAS Tech. Report, 2004.
[6] Kran Bailey Kevin Curran. An evaluation of image based steganography methods. 1999.
[7] Kran Bailey Kevin Curran. An evaluation of image based steganography methods. International Journal of Digital Evidence,Fall 2003, 2003.
[8] M. Curty and D. J. Santos. 2nd Bielefeld Workshop on Quantum Information and Complexity, 2000.
[9] D. Deutsch. Quantum computational networks. Proc. Roy. Soc. Lond. A, 425 (1989), 73-90.
[10] D. Deutsch. Quantum theory, the church-turing principle and the universal quantum computer. Proc. Roy. Soc. Lond. A, 400 (1985), 97-117.
[11] G. Doerr and J.L. Dugelay. A guide tour of video watermarking. Signal Processing: Image Communication., 18:263-282, 2003.
[12] G. Doerr and J.L. Dugelay. Security pitfalls of framebyframe approaches to video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media., 52:2955-2964, 2004.
[13] S. Dowdy and S. Wearden. Statistics for research. Wiley. ISBN 0471086029, page 230, 1983.
[14] Ross J. Anderson Fabien A. P. Petitcolas and Markus G.Kuhn. title =.
[15] R. P. Feynman. Quantum mechanical computers. Found. Phys. 16 (1986), 507.
[16] J. Gea-Banacloche. Journal of Mathematical Physics, pages 43, 4531, 2002.
[17] M. A. Jaro. Advances in record linking methodology as applied to the 1985 census of tampa florida. Journal of the American Statistical Society., 84:414-420, 1989.
[18] M. A. Jaro. Probabilistic linkage of large public health data file. statistics in medicine. Journal of the American Statistical Society., 14:491-498, 1995.
[19] Z. Duric N. F. Johnson and S. Jajodia. Information hiding: Steganography and digital watermarking - attacks and countermeasures. Kluwer Academic, 2001.
[20] D. Kahn. The codebreakers - the comprehensive history of secret communication from ancient times to the internet. Scribner, 1996.
[21] K. Martin. Lecture Notes in Computer Science, pages 4567, 32, 2008.
[22] Ashok Muthukrishnan. Classical and quantum logic gates: An introduction to quantum computing. Quantum Information Seminar(Friday, Sep. 3, 1999), Rochester Center for Quantum Information (RCQI).
[23] S. Natori. Quantum computation and information. Topics in Applied Physics(Springer, Berlin/Heidelberg), 102:235-240, 2006.
[24] S. Low N.F. Maxemchuk J.T. Brassil and L. O.Gorman. Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communications, 13:1495-1504, 1995.
[25] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE Computer, 16:26-34, 1998.
[26] Indradip Banerjee. Souvik Bhattacharyya. A novel approach for the design of secure image based steganographic model. International Journal BITM Transactions on EECC(ISSN No.: 0974-9527), 1:483- 490, August-December 2009.
[27] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier. Journal of Global Research in Computer Science, 2, April 2011.
[28] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. The text steganography using article mapping technique(amt) and ssce. Journal of Global Research in Computer Science, 2, April 2011.
[29] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. Data hiding through multi level steganography and ssce. Journal of Global Research in Computer Science, 2, February 2011.
[30] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. Implementation of a novel text based steganography model. In National Conference on Computing and Systems (NACCS), Dept. of Computer Science, The University of Burdwan, Burdwan,India., Jan 29, 2010.
[31] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. Novel text steganography through special code generation. In Proceedings of International Conference on Systemics,Cybernetics and Informatics (ICSCI-2011), Hyderabad,India., Jan 5-8, 2011.
[32] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. Design and implementation of a secure text based steganography model. In 9th annual Conference on Security and Management (SAM) under The 2010 World Congress in Computer Science,Computer Engineering and Applied Computing(WorldComp 2010), LasVegas,USA, July 12- 15,2010.
[33] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. A novel approach of secure text based steganography model using word mapping method(wmm). International Journal of Computer and Information Engineering 4:2 2010 - World Academy of Science, Engineering and Technology (WASET), 4:96103, Spring 2010.
[34] Indradip Banerjee Souvik Bhattacharyya, Arka Prokash Mazumdar and Gautam Sanyal. Text steganography using formatting character spacing. IJICS, 13, Decembar, 2010.
[35] S.P.Mohanty. Digital watermarking: A tutorial review. International Journal of Digital Evidence, Fall 2003, 2003.
[36] JHP Eloff T Mrkel and MS Olivier. An overview of image steganography. In Proceedings of the fifth annual Information Security South Africa Conference, South Africa, 2005.
[37] W. E. Winkler. The state of record linkage and current research problems. Statistics of Income Division, Internal Revenue Service Publication R99/04., 1999.