A Data Hiding Techniques Based on Length of English Text using DES and attacks

Download Full Text
Sanjay Jadhav, Viddhulata Mohite
Published Date:
July 05, 2012
Volume 2, Issue 4
23 - 29

information hiding, des, encryption, decryption
Sanjay Jadhav, Viddhulata Mohite, "A Data Hiding Techniques Based on Length of English Text using DES and attacks". International Journal of Research in Computer Science, 2 (4): pp. 23-29, July 2012. doi:10.7815/ijorcs.24.2012.036 Other Formats


The comparing recent proposal for multimedia applications network security remains an important topic for researchers. The security deals with both wired and wireless communication. Network is defined as it is a large system consisting of many similar parts that are connected together to allow the movement or communication between or along the parts or between the parts and a control center. There are the main components of the network information system such as end systems (terminals, servers) and intermediate systems (hubs, switches, gateways). Every node has its own set of vulnerabilities that can be related to hardware, software, protocol stack etc. Nodes are interconnected by physical supports in a network for example connected with cables in wired Local Area Network (LAN) or radio waves (Wi-Fi) in Wireless Local Area Network (WLAN). Some nodes are able to provide services (FTP, HTTP browsing, database access). If two nodes want to communicate together, they must be interconnected physically and logically. Network security deals with also information hiding technique. Now day’s security deals with heterogeneous networks. The use of different wireless and wired network which are working on different platform is heterogeneous. So design of network security for such type of heterogeneous network is difficult task.

  1. Stefan Katzenbeisser,Fabien A P Petitcolas. “Information hiding techniques for stegnography and digital watermarking” Artech House Publishers, 2000.
  2. Peticolas F.A.P, Anderson R.J.Kuhn M.G.information Hiding –Asurvey,Proceedings of the IEEE, 1999, 87(7), PP:1062-107.
  3. Cachin,C, “An information Theoretic model for stegnography”, in proceeding of the second international workshop on information hiding,vol.1525 of lecture notes in computer science, Springer, 1998, pp.306-308.
  4. Jeremiah J. Haarmsen, William A.Pearlman “Steganalysis of additive noise modelable information hiding” Electrical Computer and systems Engineering Department,Rensselar Polytechnic Institute, Troy,NY.
  5. Neil F.Jhonson and Sushil Jajodia “Steganalysis: The investigation of hidden information” The 1998 IEEE Information Technology Conference. September 1st-3rd,1998.
  6. Jonathan Watkins “Steganography-Message Hidden in Bits” Multimedia Systems Coursework, Department of Electronics and computer Science, University of Southampton. 15th December 2001.
  7. Leonid Reyzin and Scott Russell “More efficient provably Secure Stegnography” Department of computer science Boston University, May 15,2003.
  8. P.Davern, M.Scott “Steganography: its history and its application to computer based data files” Dublin City University.
  9. Liu Cuilin,Shen Yongiun,Zhang Guidong,Di Changyan “A Data Hiding System Based on Length of English Text” 2010 first ACIS International Symposium on Cryptography, and Network Security,Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems.

  • Samuel King Opoku, "A Robust Cryptographic System using Neighborhood-Generated Keys". International Journal of Research in Computer Science, 2 (5): pp. 1-9, September 2012. doi:10.7815/ijorcs.25.2012.041
  • Pandey, Nikita, Sayani Nandy, and Shelly Sinha Choudhury. "Alternative shift algorithm for digital watermarking on text." International Journal of Scientific and Research Publications 2.10 (2012): 1.
  • Keswani, Leena Goyal, Dr Bright. "Study, analysis and formulation of a new method for integrity protection of digital data from unauthorized access."
  • Goyal, Leena, Mukesh Vijay, and Prateek Diwan. "Integrity Protection of Text Document Data from Unauthorized Modifications." Journal of Advanced Database Management & Systems 1.3 (2014): 1-5.