SMS Blind Steganography by Using Maximum-Minimum Method
Abstract
Full Text:
PDFReferences
A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods”, Signal Processing 90 (2010) 727–752.
Ingcmar J. Cox, Mattew L. Millet, Jeffrey A. Bloom, Jessica Fridrich, and Tan Kalker, Digital Watermarking and Steganography,2th Ed. The Morgan kaufman publishers, USA, Elsevier, 2008.
A.zare, A.R.Naghshnilchi “Steganography in SMS by New odd-even method” , Proc. of the 16th International CSI Computer Conference (CSICC'2006), School of Computer Science, IPM, Tehran, Iran, 24-26 Jan. 2011, pp.905-910 , (in Persian).
Shirali-Shahreza, M.H., Shirali-Shahreza, M., “Steganography in SMS by Sudoku Puzzle”, 978-1-4244-1968-2008 IEEE.
Shirali-Shahreza, M, “Text Steganography by Changing Words Spelling”, In 10th International Conference on Advanced Communication Technology, ICACT 08, vol. 3, pp. 1912-1913, 17-20 Feb. 2008
Shirali-Shahreza, M.H., Shirali-Shahreza, M., “Text Steganography in Chat”, In 3rd IEEE/IFIP International Conference in Central Asia, pp. 1-5, 26-28 Sept. 2007
M.H. Shirali-Shahreza and M. Shirali-Shahreza, "A New Approach to Persian/Arabic Text Steganography", Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006), Honolulu, HI, USA, 10-12 July, 2006, pp. 310-315.
M. Shirali-Shahreza, "Steganography in SMS," Proc. of the 11th International CSI Computer Conference (CSICC'2006), School of Computer Science, IPM, Tehran, Iran, 24-26 Jan. 2006, pp.905-910 , (in Persian).
JohnWiley and Sons Ltd, Mobile Messaging Technologies and services SMS,EMS and MMS,2nd Ed. Gwenael Le Roodic,England.,West Sussex Po19 8SQ,2005.
N.F. Johnson, S.C. Katzenbeisser, A survey of steganographic techniques, in: S. Katzenbeisser, F.A.P. Petitcolas (Eds.), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Inc., Norwood, 2000.
M. Shirali-Shahreza, "Stealth Steganography in SMS,"Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2006), 11-13 April, 2006.
M. Wu, E. Tang, and B. Liu, "Data hiding in digital binary image," in IEEE Int. Conf. Multimedia & Expo, New York, 2000.
M. Wu and B. Liu, "Data Hiding in Binary Image for Authentication and Annotation," IEEE Trans. on Multimedia, vol. 6, no. 4, August 2004, pp.528-538.
M. Shirali-Shahreza, "An Improved Method for Steganography on Mobile Phone," WSEAS Transactions on Systems, Vol. 4, Issue 7, July 2005, pp. 955-957.
Westfeld, A., “F5__ A Steganographic Algorithm :High Capacity Despite Better Steganalysis”, Proc. 4th Int’l Information Hiding Workshop, Springer-Verlog Vol.2137, Berlin Heidelberg New York ,pp.289-302, 2001.
Provos, N., “Defending Against Statistical Steganalysis”, Proc. 10th Usenix Security Symp, Usenix Assoc., pp. 323-335, 2001.
Lee, Y.K. Chen, L.H. “High capacity image steganographic model,” Vision, Image and Signal Processing, IEE Proceedings, Vol 147, 288-294, Jun 2000.
Anderson, R.J, Petitcolas, F.A.P., “On the Limits of Steganography”, IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and privacy Protection, Vol. 16(4), pp. 474-481, May 1998.
Y. C. Tseng, Y. Y. Chen, and H. K. Pan, "A Secure Data Hiding Scheme for Binary Images," IEEE Trans. on Communications, Vol. 50, No. 8, Aug. 2002, pp. 1227-3 1.
Y. Y. Chen, H. K. Pan, and Y. C. Tseng, "A Secure Data Hiding Scheme for Two-Color Images," IEEE Symposium on Computers and Communications, 2000, pp. 750-755.
Y. C. Tseng and H. K. Pan, "Secure and Invisible Data Hiding in 2-Color Images," IEEE INFOCOM, 2001, pp. 887-896.
Rafat K.F., “Enhanced Text Steganography in SMS”, 2nd International Conference on Computer, Control and Communication, 18 Feb 2009.
Cole E.,” Hiding in Plain Sight: Steganography and the Art of Covert Communication”, John Wiley, Indianapolis, Indiana, 2003.
Venkatesan M., MeenakshiDevi P., Duraiswamy K., Thiagarajah K., “A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity” Third International Symposium on Information Assurance and Security, IEEE, 2007.
Chhajed J., Inamdar V., Attar V., “Steganography in Black and White Picture Images”, Congress on Image and Signal Processing, IEEE, 2008.
Böhme R., “Advanced Statistical Steganalysis”, Springer, Verlag Berlin Heidelberg, 2010.
Bender W., Gruhl D., Morimoto N., Lu A., "Techniques for data hiding", IBM Systems Journal, vol. 35, Issues 3&4, 1996, pp. 313-336.
Kim Y., Moon K., Oh I., "A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics", Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR’03), 2003, pp. 775–779.
Gutub A., Fattani M., "A Novel Arabic Text Steganography Method Using Letter Points and Extensions", Proceedings of the WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE), Vienna, Austria, Vol. 21, 2007, pp. 28-31.
Aabed M.A., Awaideh S.M., Elshafei A.M., GutuA. A. b, “Arabic Diacritics Based Steganography”, Proceedings of the International Conference on Signal Processing and Communications (ICSPC 2007), Dubai, UAE, 2007, pp. 756-759.
Gyankamal J. Chhajed ; Vandana Inamdar ; Vahida Attar, " Steganography in Black and White Picture Images” IEEE Image and Signal Processing, CISP '08. Congress on Sanya, Hainan, China, 27-30 May 2008.
Ajetrao H., Kulkarni P.J., Gaikwad N., “A Novel Scheme of Data Hiding in Binary Images”, International Conference on Computational Intelligence and Multimedia Applications, IEEE, 2007.
Prem Singh, Rajat Chaudhary and Ambika Agarwal “ A Novel Approach of text Steganography based on null spaces” IOSr Journal of Computer Engineering (IOSRJCE) ISSN:2278-0661 Vol 3, Issue 4 (July – Aug 2012) PP 11-17 www.isorjournals.org
Thamaraiselvan, R., and A. Saradha. "A Novel approach of Hybrid Method of Hiding the Text Information Using Stegnography." IJCER 1, no. 1 (2012).
Zhi-Hui Wang “ Emoticon-Based Text Steganography in Chat” School Of Software Dalian University of Technology Dalian,Lionging China, 978-1-4244-4607-0/09/25.00 ©2009 IEEE wangzhihui
Ahmed khan, “Robust Textual Steganography”, Journal of Science (JOS) ISSN 2324-9854, Vol. 4, No. 4, 2015, Pages: 426-434.
Shunquan Tan , Haojie Zhang , Bin Li , Jiwu Huang. “Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography”, IEEE Transactions on Information Forensics and Security ( Volume: 12, Issue: 7, July 2017 ). Pages: 1658 – 1670.
Refbacks
- There are currently no refbacks.
Copyright (c) 2018 Journal of Electrical Engineering, Electronics, Control and Computer Science

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.