Secure PDF Text Steganography by Transforming Secret Into Imperceptible Coding
Sanjive Tyagi1, Rakesh Kumar Dwivedi2, Ashendra Kumar Saxena3
1Sanjive Tyagi, College of Computing Sciences and Information Technology, Teerthanker Mahaveer University, India.
2Prof. (Dr). Rakesh Kumar Dwivedi, Principal-College of Computing Sciences and Information Technology, Teerthanker Mahaveer University, India.
3Dr. Ashendra Kumar Saxena, Associate Professor- College of Computing Sciences and Information Technology, Teerthanker Mahaveer University, India.
Manuscript received on January 05, 2020. | Revised Manuscript received on January 25, 2020. | Manuscript published on January 30, 2020. | PP: 4885-4891 | Volume-8 Issue-5, January 2020. | Retrieval Number: D9282118419/2020©BEIESP | DOI: 10.35940/ijrte.D9282.018520
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In this paper, we have proposed an approach of PDF based text Steganography by considering the hiding capacity and security of secret information, and improved imperceptibility of stego-cover file. In proposed approach secret information are transformed into compact and encrypted form of imperceptible coding, and then translated into bits form, thereafter embedded into targeted locations of PDF file by applying new cross-reference coding technique in incremental updates of PDF file with less computation complexity. The proposed extraction process provides authentication of received stego-cover file such that only desired file is accepted for the extraction process otherwise fake file is discarded by recipient. Time complexity has been improved significantly by implementing a novel method of PDF steganography for embedding the secret data. Experimental result demonstrates that proposed method provides efficient algorithms in terms of improved security of hidden information.
Keywords: Compatibility, Cross-reference, Distortion, e-Document, Incremental, Steganography.
Scope of the Article: Cross-layer Optimization.