Hiding in Text using Information Integrity Service
AL-Rafidain Journal of Computer Sciences and Mathematics,
2009, Volume 6, Issue 1, Pages 115-122
AbstractModern computer networks make it possible to distribute documents quickly and economically. This is because of the decreasing cost of the equipment needed to copy, print, process the information. The widespread adoption of electronic distribution of copyrighted material is accompanied by illicit copying and illicit distribution. This is why people used steganography. Steganography is the art of hiding transmitting data through apparently innocuous carriers in an effort to conceal the existence of the data.
The carrier can be anything used to transfer information, including for example: wood or state tablets, hollow heels, images under stamps, tiny photographs, or word arrangements. Digital carriers include: disk space, disk partitions, text, e-mail, audio, images, and video.
In this paper, we propose a new conceptual framework for text file steganography by using integrity tool. Hash function was used to produce a checksum.
- Article View: 60
- PDF Download: 87