Please use this identifier to cite or link to this item:
http://localhost:80/xmlui/handle/123456789/4748
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rafat, Khan Farhan | - |
dc.date.accessioned | 2017-12-13T10:21:31Z | - |
dc.date.accessioned | 2020-04-11T15:32:51Z | - |
dc.date.available | 2020-04-11T15:32:51Z | - |
dc.date.issued | 2013 | - |
dc.identifier.uri | http://142.54.178.187:9060/xmlui/handle/123456789/4748 | - |
dc.description.abstract | This dissertation endeavors at evolving portentous novel secure steganographic bit embedding schemes for digital ASCII text document besides suggesting enhancement in some existing text-centric steganographic methods. Further, a cover generation algorithm for the said purpose is also conferred. Our proposed algorithms uses substitution technique for embedding / hiding secret message bits inside the text-cover whereas our cover generation algorithm exploits statistical characteristics of randomly generated data for data hiding purpose. To contrast our proposed schemes with prevalent schemes we have quantified the test results using Hamming distance, Levenshtein metric (also called edit distance) and Jaro-Winkler distance, where to elaborate on the quality of quantified results we have plotted probability distribution of Cover and Stego (Text) Object for visual analysis. Security of prevailing and newly proposed Steganographic schemes is gauged using “Known Cover and Known Message Attacks” where “Chosen Message Attack” instantly reveals the logic behind prevalent Steganographic schemes. Our experimental results are in confirmation with generally accepted evaluation metrics for gauging Steganographic Systems. Moreover, our suggested bit embedding methods does not increase or decrease the size of original Cover file but yet increases its bit embedding capacity. Also, saving the Stego Object in Portable Document Format (.pdf), and / or MS Word (.doc) file (including Notepad) and its retrieval thereafter does not suffer from any information loss. The advantage of our proposed Cover (as fake cryptogram groups) generation method is that the Stego Object can be transmitted in printed form without requiring a code book for bit extraction at receiving end. | en_US |
dc.description.sponsorship | Higher Education Commission, Pakistan | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Islamic university, Islamabad PAKISTAN | en_US |
dc.subject | Computer science, information & general works | en_US |
dc.title | DIGITAL STEGANOGRAPHY FOR ASCII TEXT DOCUMENT | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Thesis |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.