Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A new approach to SMS Text Steganography using Emoticons

Print
PDF
IJCA Proceedings on National Conference on Role of Engineers in National Building
© 2014 by IJCA Journal
NCRENB
Year of Publication: 2014
Authors:
Tatwadarshi P. Nagarhalli

Tatwadarshi P Nagarhalli. Article: A new approach to SMS Text Steganography using Emoticons. IJCA Proceedings on National Conference on Role of Engineers in National Building NCRENB:1-3, June 2014. Full text available. BibTeX

@article{key:article,
	author = {Tatwadarshi P. Nagarhalli},
	title = {Article: A new approach to SMS Text Steganography using Emoticons},
	journal = {IJCA Proceedings on National Conference on Role of Engineers in National Building},
	year = {2014},
	volume = {NCRENB},
	pages = {1-3},
	month = {June},
	note = {Full text available}
}

Abstract

One of the widely used service provided by mobile phones is the Short Messaging Services. It enables the user to send short messages to the receiver he/she intends to communicate. This paper proposes a new method at text steganography where the emoticons that are so generously and frequently used in SMS's are used to hide information, particularly an alphabet or a number.

References

  • Hillebrand, F. 2010. Short Message Service (SMS): The Creation of Personal Global text Messaging, Wiley.
  • Garg, M. 2011. A novel text steganography technique based on html documents, International Journal of advanced Science and Technology, vol. 35, pp. 129-138.
  • Bender, W. Gruhl, D. Morimoto, N. and Lu, A. 1996 Techniques for data hiding, IBM Systems Journal, vol. 35, Issues 3&4, pp. 313-336.
  • Changder, S. Debnath N. C. and Ghosh, D. A New Approach to Hindi Text Steganography by Shifting Matra, 2009 International Conference on Advances in Recent Technologies in Communication and Computing, pp. 199-202.
  • Low, S. H. Maxemchuk, N. F. Brassil, J. T. and O'Gorman, L. 1995. Document Marking and Identification Using Both Line and Word Shifting, In 14th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '95), vol. 2, pp. 853-860.
  • Alattar, A. M. and Alattar, O. M. 2004. Watermarking electronic Text Documents Containing Justified Paragraphs and Irregular Line Spacing, In SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 685-695.
  • Bennett, K. 2004. Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text, Purdue University, CERIAS Tech.
  • Kim, Y. Moon, K. and Oh, I. 2003. A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics, In 7th International Conference on Document Analysis and Recognition (ICDAR03), pp. 775-779.
  • Niimi, M. Minewaki, S. Noda, H. and Kawaguchi, E. 2003. A Framework of Text-based Steganography Using SD-Form Semantics Model, In Pacific Rim Workshop on Digital Steganography, Kyushu Institute of Technology, Kitakyushu, Japan, July 3-4.
  • Rabah, K. 2004. Steganography-The Art of Hiding Data, Trans. Information Technology Journal, vol. 3, Issue 3, pp. 245-269.
  • Shirali-Shahreza, M. H. , Shirali-Shahreza, M. 2006 A New Approach to Persian/Arabic Text Steganography, In Computer and Information Science, ICIS-COMSAR 2006. 5th IEEE/ACIS International Conference, pp 310-315.
  • Huang, D. and Yan, H. 2001. Interword Distance Changes Represented by Sine Waves for Watermarking Text Images, Trans Circuits and Systems for Video Technology, IEEE, vol. 11, no. 12, pp. 1237-1245.
  • Shirali-Shahreza, M. 2008. Text Steganography by Changing Words Spelling, In 10th International Conference on Advanced Communication Technology, ICACT 08, vol. 3, pp. 1912-1913.
  • Shirali-Shahreza, M. H. , Shirali-Shahreza, M. 2007, Text Steganography in SMS, In International Conference on Convergence Information Technology, pp. 2260-2265.
  • Khan, F. R. Enhanced Text Steganography in SMS.
  • Shirali-Shahreza, M. H. Shirali-Shahreza, M. 2007 Text Steganography in Chat, In 3rd IEEE/IFIP International Conference in Central Asia, pp. 1-5.
  • Wang, Z. et. Al, Emoticon-based Text Steganography in Chat, 2009 Second Asia-Pacific Conference on Computational Intelligence and Industrial Applications, pp. 457-460.