Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes
Data communication over the Internet has increased significantly, resulting in high data traffic and concerns over data security. Information sent over the Internet always gets the attention of intruders, which causes the effort to increase the security of sensitive data and the need to prevent leak...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
UUM Press
2023
|
Subjects: | |
Online Access: | https://repo.uum.edu.my/id/eprint/29742/1/JCIA%2002%2001%202023%2021-40.pdf https://doi.org/10.32890/jcia2023.2.1.2 https://repo.uum.edu.my/id/eprint/29742/ https://e-journal.uum.edu.my/index.php/jcia/article/view/16675 https://doi.org/10.32890/jcia2023.2.1.2 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uum.repo.29742 |
---|---|
record_format |
eprints |
spelling |
my.uum.repo.297422023-09-10T14:50:06Z https://repo.uum.edu.my/id/eprint/29742/ Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes Osman, Baharudin Yahya, Noor Izzah Mohd Zaini, Khuzairi Abdullah, Azizol T Technology (General) Data communication over the Internet has increased significantly, resulting in high data traffic and concerns over data security. Information sent over the Internet always gets the attention of intruders, which causes the effort to increase the security of sensitive data and the need to prevent leakage. Steganography is one of the techniques to protect the confidentiality of data that can be accomplished by hiding secret information within the medium of text, images, audio, and video. Hiding a secret message using text steganography can be done on character properties such as size, colour, style, etc. Colour- based steganography has always raised suspicions about the generated stego text, which is a major issue in this study. Therefore, the Red, Green, and Blue (RGB) colour technique and the Second Quotient Remainder Theorem (SQRT) were introduced in this study to perform the hiding process. RGB (0,0,0) to RGB (15,15,15) colours were used for the hiding process to avoid colour suspicion. In addition, the pseudorandom number generator (PRNG) was also used to generate dynamic hidden messages with Homophonic table generation. The results showed that the secret message can be represented dynamically and has increased the hiding capacity to 77.4%. Other than that, the selected colour has successfully avoided the suspicion of the generated stego text. Hence, the results suggested that SQRT could be employed as a method in text steganography for securing information. UUM Press 2023 Article PeerReviewed application/pdf en cc4_by https://repo.uum.edu.my/id/eprint/29742/1/JCIA%2002%2001%202023%2021-40.pdf Osman, Baharudin and Yahya, Noor Izzah and Mohd Zaini, Khuzairi and Abdullah, Azizol (2023) Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes. Journal of Computational Innovation and Analytics (JCIA), 2 (1). pp. 21-40. ISSN 2821-3408 https://e-journal.uum.edu.my/index.php/jcia/article/view/16675 https://doi.org/10.32890/jcia2023.2.1.2 https://doi.org/10.32890/jcia2023.2.1.2 |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Institutional Repository |
url_provider |
http://repo.uum.edu.my/ |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Osman, Baharudin Yahya, Noor Izzah Mohd Zaini, Khuzairi Abdullah, Azizol Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes |
description |
Data communication over the Internet has increased significantly, resulting in high data traffic and concerns over data security. Information sent over the Internet always gets the attention of intruders, which causes the effort to increase the security of sensitive data and the need to prevent leakage. Steganography is one of the techniques to protect the confidentiality of data that can be accomplished by hiding secret information within the medium of text, images, audio, and video. Hiding a secret message using text steganography can be done on character properties such as size, colour, style, etc. Colour- based steganography has always raised suspicions about the generated stego text, which is a major issue in this study. Therefore, the Red, Green, and Blue (RGB) colour technique and the Second Quotient Remainder Theorem (SQRT) were introduced in this study to perform the hiding process. RGB (0,0,0) to RGB (15,15,15) colours were used for the hiding process to avoid colour suspicion. In addition, the pseudorandom number generator (PRNG) was also used to generate dynamic hidden messages with Homophonic table generation. The results showed that the secret message can be represented dynamically and has increased the hiding capacity to 77.4%. Other than that, the selected colour has successfully avoided the suspicion of the generated stego text. Hence, the results suggested that SQRT could be employed as a method in text steganography for securing information. |
format |
Article |
author |
Osman, Baharudin Yahya, Noor Izzah Mohd Zaini, Khuzairi Abdullah, Azizol |
author_facet |
Osman, Baharudin Yahya, Noor Izzah Mohd Zaini, Khuzairi Abdullah, Azizol |
author_sort |
Osman, Baharudin |
title |
Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes |
title_short |
Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes |
title_full |
Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes |
title_fullStr |
Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes |
title_full_unstemmed |
Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes |
title_sort |
text steganography using the second quotient remainder theorem and dark colour schemes |
publisher |
UUM Press |
publishDate |
2023 |
url |
https://repo.uum.edu.my/id/eprint/29742/1/JCIA%2002%2001%202023%2021-40.pdf https://doi.org/10.32890/jcia2023.2.1.2 https://repo.uum.edu.my/id/eprint/29742/ https://e-journal.uum.edu.my/index.php/jcia/article/view/16675 https://doi.org/10.32890/jcia2023.2.1.2 |
_version_ |
1778165221868699648 |
score |
13.211869 |