Future of Information and Communication Conference (FICC) 2025
28-29 April 2025
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 7 Issue 12, 2016.
Abstract: The rapid advancement of technology has changed the way of our living. Sharing information becomes inevitable in everyday life. However, it encounters many security issues when dealing with secret or private information. The transmission of such sophisticated information has become highly important and received much attention. Therefore, various techniques have been exercised for security of information. Graph steganography is a way of hiding information by translating it to plotted data in a graph. Because of numerous usages of graphs in everyday life, the transmission can take place without drawing any attention. In this paper, we propose a new graph realization technique for steganography that looks as if innocent and imperceptible to present day steganalytic attacks and the hidden message can only be read by its respective recipient. The secret message is first translated to prefix codes using huffman encoding. Then the prefix code for separate word in the message is plotted in a graph. The proposed technique offers high embedding capacity and imperceptibility due to prefix presentation and word by word encoding of the message. The experimental outcomes show strong resistance towards steganalytic attacks in contrast to other approaches.
Fatema Akhter and Md. Selim Al Mamun, “A New Approach of Graph Realization for Data Hiding using Human Encoding” International Journal of Advanced Computer Science and Applications(IJACSA), 7(12), 2016. http://dx.doi.org/10.14569/IJACSA.2016.071256
@article{Akhter2016,
title = {A New Approach of Graph Realization for Data Hiding using Human Encoding},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2016.071256},
url = {http://dx.doi.org/10.14569/IJACSA.2016.071256},
year = {2016},
publisher = {The Science and Information Organization},
volume = {7},
number = {12},
author = {Fatema Akhter and Md. Selim Al Mamun}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.