Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(435.08KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Analysis of Natural Language Steganography
Shaifizat Mansor, Roshidi bin Din, Azman Samsudin
Pages - 113 - 125     |    Revised - 05-05-2009     |    Published - 18-05-2009
Volume - 3   Issue - 2    |    Publication Date - April 2009  Table of Contents
MORE INFORMATION
KEYWORDS
Steganography, Text Steganography, Secret Message, Software Metric
ABSTRACT
The technology of information hiding through an open network has developed rapidly in recent years. One of the reasons why we need tools to hide message, is to keep secret message concealed from unauthorized party. Steganography is one of the techniques in sending secret message. In this paper, several software metrics were used to analyze the common criteria in steganographic tools and measure the complexity of the tools in hiding message. Several criterias have been chosen: Percent Lines with Comments (PLwC); Average Statements per Function (ASpF) and Average Block Depth (ABD) to measure the tools complexity. The analysis process has been implemented using a single Linux platform.
CITED BY (4)  
1 Ogilvie, R., & Weir, G. R. (2012). Genre-based information hiding. In Global Security, Safety and Sustainability & e-Democracy (pp. 104-111). Springer Berlin Heidelberg.
2 Ananthi, S., & Anjanadevi, A. (2012). Reversible Image Data Hiding Using Predictive Coding Technique Based on Steganograpic Scheme. International Journal of Engineering and Innovative Technology (IJEIT) Volume, 2.
3 S. Ortolani, M. Conti and B. Crispo, “Censorship-Resilient Communications Through Information Scattering”, in Proceedings of the 18th International Workshop on Security Protocols (IWSP 2010), Cambridge, UK, March 24-26, 2010.
4 Miao Haibo , Liu Sheng Huang , Chen Zhili , & Yang Wei . ( 2010 ) . For text analysis and detection of hidden tools Stegparty . COMMUNICATIONS , (9A), 37-258.
1 Directory Of Open Access Journals (DOAJ)
2 Google Scholar
3 Academic Journals Database
4 ScientificCommons
5 Academic Index
6 CiteSeerX
7 refSeek
8 Socol@r
9 ResearchGATE
10 Libsearch
11 Bielefeld Academic Search Engine (BASE)
12 Scribd
13 WorldCat
14 slideshare
15 PDFCAST
16 PdfSR
17 Chinese Directory Of Open Access
1 M. A. A. Murad, and T. Martin. “Similarity-based estimation for document summarization using Fuzzy sets”. International Journal of Computer Science and Security (IJCSS), Computer Science Journal Press, Kuala Lumpur, 1(4): 1 - 12, Nov/Dec 2007
2 B. V. Dhandra, and M. Hangarge. “Morphological reconstruction for word level script identification”. International Journal of Computer Science and Security (IJCSS), Computer Science Journal Press, 1(1): 41 - 51, May/June 2007
3 M. A. A. Murad, and T. Martin. “Similarity-based estimation for document summarization using Fuzzy sets”. International Journal of Computer Science and Security (IJCSS), Computer Science Journal Press, Kuala Lumpur, 1(4): 1 - 12, Nov/Dec 2007
4 B. V. Dhandra, and M. Hangarge. “Morphological reconstruction for word level script identification”. International Journal of Computer Science and Security (IJCSS), Computer Science Journal Press, 1(1): 41 - 51, May/June 2007
5 J. J. Eggers, R. Bäuml, and B. Girod. “A communications approach to image steganography”. In Proceedings of SPIE: Electronic Imaging, Security and Watermarking of Multimedia Contents IV, 4675:26-37, San Jose, CA, USA, January 2002
6 J. Zollner, H. Federrath, H. Klimant, A. Pritzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf. “Modeling the security of steganographic systems”. In 2nd International Workshop Information Hiding. Springer, Berlin/Heidelberg, German, vol. 1525: 345 - 255, 1998
7 C. Kant, R. Nath, and S. Chaudhary. “Biometrics security using steganography”. International Journal of Security (IJS), Computer Science Journal Press, 2(1): 1 - 5, Jan/Feb 2008
8 N. F. Johnson, S. Jajodia. “Exploring steganography: seeing the unseen”. IEEE Computer Magazine, 31(2):26 – 34, 1998
9 M. Chapman, G. I. Davida, and M. Rennhard. “A practical and effective approach to largescale automated linguistic steganography”. In Proceedings of the Information Security Conference (ISC '01), Malaga, Spain, 156 -165, October 2001
10 F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn. “Information hiding: A survey”. In Proceedings of the IEEE on Protection of Multimedia Content, 87(7):1062 - 1078, July 1999
11 Z. Oplatkova, J. Holoska, I. Zelinka, and R. Senkerik. “Steganography Detection by Means of Neural Networks”. 19th International Conference on Database and Expert Systems Application (DEXA ’08), 2008
12 K. Ochiawai, H. Iwasaki, J. Naganuma, M. Endo, and T. Ogura. “High Speed Software-based Platform for Embedded Softwar of A Single-Chip MPEG-2 Video Encoder LSI with HDTV Scalibility”. In Proceeding of the Conference on Design, Automation and Test in Europe: 1-6, 1999
13 D. Welzel, H. L. Hausen. “A five steps method for metric-based software evaluation: effective software metrication with respect to quality standard”. Journal of ACM, 39(2 –5):273 – 276, 1993
14 A. Westfield, A. Pfitzmann. “Attacks on steganographic systems”. In Proceedings of 3rd International Workshop Computer Science (IH '99) Germany, 1999
15 S. R. Baragada, M. S. Rao, S. Purushothaman, and S. Ramakrishna. “Implementation of radial basis function neural network for image steganalysis”. International Journal of Computer Science and Security (IJCSS), Computer Science Journal Press, Kuala Lumpur, 1(4): 12 - 22, Jan/Feb 2008
16 S. Nystedt, C. Sandros. “Software Complexity and Project Performance”. Master Thesis and Bachelor Thesis, University of Gothenburg, 1999
17 K. Maher. “Texto”. Underware Software Production Ltd. Inc.,1995, http://linkbeat.com/files/
18 J. Walker. “Steganosaurus”. 1997, http://www.fourmilab.ch/ or http://www.fourmilab.to/stego/
19 M. Kwan. “SNOW”. Darkside Technologies Pty Ltd ACN 082 444 246 Australia, 1998 http://www.darkside.com.au/snow/index.html
20 S. E. Hugg. “StegParty”. Hamco Software (COMETBUSTERS-DOM) 1249 Turkey Point Rd Edgewater, MD 21037 US, 1999 http://www.cometbusters.com/hugg/projects/stegparty.html
21 Steganos can be accessed at; http://zerblatt.forex.ee/~ftp/crypto/code/STEGANOS.ZIP
22 Snowdrop can be accessed at; http://linux.softpedia.com/get/Programming/Version- Control/snowdrop-23917.shtml
23 PGPn123 can be accessed at; ftp://ftp.dei.uc.pt/pub/pgp/pc/windows/
24 FFEncode can be accessed at; http://www.rugeley.demon.co.uk/security/ffencode.zip
25 METRIC DATA PROGRAM can be accessed at http://mdp.ivv.nasa.gov/loc_metrics.html#PERCENT_COMMENTS
26 C. Johns. Applied Software Measurement (3rd Edition). USA, 2008
27 Metrics Complexity can be accessed at http://download.instantiatons.com/CodeProDoc
28 M. Kharrazi, H. T. Sencar, Memon. “Benchmarking steganographic and steganalysis techniques” Security, Steganography, and Watermarking of Multimedia Contents, 2005
29 R. P. Cook. “An introduction to modular programming”, 1995 from http://www.docdubya.com/belvedere/cpp/modular.html
Mr. Shaifizat Mansor
- Malaysia
Mr. Roshidi bin Din
- Malaysia
roshidi@uum.edu.my
Mr. Azman Samsudin
- Malaysia