MY147993A - Text steganography - Google Patents
Text steganographyInfo
- Publication number
- MY147993A MY147993A MYPI20091960A MY147993A MY 147993 A MY147993 A MY 147993A MY PI20091960 A MYPI20091960 A MY PI20091960A MY 147993 A MY147993 A MY 147993A
- Authority
- MY
- Malaysia
- Prior art keywords
- text
- secret data
- cover
- bits
- represented
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3261—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of multimedia information, e.g. a sound signal
- H04N2201/3266—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of multimedia information, e.g. a sound signal of text or character information, e.g. text accompanying an image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/328—Processing of the additional information
- H04N2201/3281—Encryption; Ciphering
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
Abstract
A METHOD TO HIDE SECRET DATA IN COVER TEXT IS DESCRIBED. SECRET DATA IS ENCODED INTO BASE64 STRING. NEXT, THE COVER TEXT LENGTH IS DETERMINED (42) TO DETERMINE MINIMUM CAPACITY OF WHITE SPACES REQUIRED TO ACCOMMODATE SECRET DATA. LATER, DATA IS CONVERTED INTO BITS (44). THE BITS ARE HIDDEN INTO COVER TEXT (46) WHEREIN BIT VALUE OF 0 IS REPRESENTED WITH SINGLE SPACE BETWEEN TEXT AND BIT VALUE OF 1 IS REPRESENTED WITH DOUBLE SPACE BETWEEN TEXT TO FORM A STEGO-TEXT (22).
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI20091960 MY147993A (en) | 2009-05-14 | 2009-05-14 | Text steganography |
PCT/MY2009/000167 WO2010131939A1 (en) | 2009-05-14 | 2009-10-13 | Text steganography |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI20091960 MY147993A (en) | 2009-05-14 | 2009-05-14 | Text steganography |
Publications (1)
Publication Number | Publication Date |
---|---|
MY147993A true MY147993A (en) | 2013-02-28 |
Family
ID=43085190
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI20091960 MY147993A (en) | 2009-05-14 | 2009-05-14 | Text steganography |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY147993A (en) |
WO (1) | WO2010131939A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108462553B (en) * | 2017-02-17 | 2021-04-13 | 中国移动通信集团内蒙古有限公司 | Data transmission method and device and electronic equipment |
US10755375B2 (en) | 2017-02-24 | 2020-08-25 | The Trustees Of Columbia University In The City Of New York | Systems and methods for steganography based on text fonts |
CN108271027B (en) * | 2018-01-10 | 2020-06-12 | 中国人民解放军战略支援部队信息工程大学 | Method for extracting image self-adaptive secret information |
CN109995503B (en) * | 2019-03-11 | 2022-03-18 | 青岛大学 | Electronic grid construction method based on secret key |
CN111447188B (en) * | 2020-03-20 | 2022-03-18 | 青岛大学 | Carrier-free text steganography method based on language steganography feature space |
CN114386103B (en) * | 2022-01-14 | 2022-10-04 | 北京邮电大学 | Secret information hiding method, secret information extracting method and transmission system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3542678B2 (en) * | 1995-12-28 | 2004-07-14 | 沖電気工業株式会社 | Encoding and decoding methods using the length of the space between words in an electronic document, a method for embedding signature information in an electronic document, and a method for encrypting a confidential document |
US7240209B2 (en) * | 2001-06-12 | 2007-07-03 | International Business Machines Corporation | Methods of invisibly embedding and hiding data into soft-copy text documents |
US8014557B2 (en) * | 2003-06-23 | 2011-09-06 | Digimarc Corporation | Watermarking electronic text documents |
US7724916B2 (en) * | 2005-01-03 | 2010-05-25 | New Jersey Institute Of Technology | System and method for data hiding using inter-word space modulation |
CN1897522B (en) * | 2005-07-15 | 2010-05-05 | 国际商业机器公司 | Water mark embedded and/or inspecting method, device and system |
-
2009
- 2009-05-14 MY MYPI20091960 patent/MY147993A/en unknown
- 2009-10-13 WO PCT/MY2009/000167 patent/WO2010131939A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2010131939A1 (en) | 2010-11-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MY147993A (en) | Text steganography | |
TW200746828A (en) | Watermarking encoded content | |
GB2489369A (en) | Processing of geological data | |
NZ603822A (en) | Permutation data transform to enhance security | |
MY167133A (en) | Well completion | |
GB2440878A (en) | Nibble de-skew method,apparatus and system | |
WO2010024619A3 (en) | Symbol mapping apparatus and method | |
ZA201101642B (en) | Method and arrangement in rock drilling rig | |
WO2009116953A3 (en) | Method and system for embedding covert data in a text document using space encoding | |
WO2011106197A3 (en) | Rule-based system and method to associate attributes to text strings | |
WO2011037775A3 (en) | Systems and methods for geometric data compression and encryption | |
Zacny et al. | Methods for cuttings removal from holes drilled on Mars | |
WO2011071649A3 (en) | Data line storage and transmission utilizing both error correcting code and synchronization information | |
SG155791A1 (en) | Method for embedding covert data in a text document using character rotation | |
Wood | The natural gas sector is changing rapidly: Research and technology development remain the keys to overcoming challenges and unlocking opportunities | |
Trifunac | 75th Anniversary of the response spectrum method-A historical review | |
Ben Amara et al. | On a fourth-order problem with spectral and physical parameters in the boundary condition | |
IL194050A (en) | Method for encoded or encrypted bit stream synchronization | |
WO2011149747A3 (en) | Efficient application-neutral vector documents | |
RU2009110837A (en) | WEDGLESS METHOD FOR DRILLING A MULTIPLE WELL BORE | |
TW200801927A (en) | Method to adjust error thresholds in a data storage retrieval system | |
Yagiz | Discussion on the article" Influence of rock brittleness on TBM penetration rate in Singapore granite" by QM Gong and J. Zhao [Tunnelling and Underground Space Technology 22 (2007) 317-324] and" Response by the authors to RM Goktan discussion to the paper" Influence of rock brittleness on TBM penetration rate in Singapore granite" by QM Gong and J. Zhao [Tunnelling and Underground Space Technology 23 (2008) 217-218] | |
Brazelton et al. | Microbial carbon cycling in Lost City hydrothermal chimneys and other serpentinite-hosted ecosystems | |
Cooper et al. | Duplicating the Effects of Space Weathering | |
Penman et al. | B/Ca of planktic foraminifera documents elevated pCO2 and ocean acidification during the Paleocene-Eocene Thermal Maximum |