1
International Journal of Computer (IJC)
ISSN 2307-4523 (Print & Online)
© Global Society of Scientific Research and Researchers
http://ijcjournal.org/
A Study on Text Based Steganography Using Email
Platform and Color Mapping
Amanpreet Kaur
a*
, Sukhvir Kaur
b
, Gunjan Sethi
c
a
Research Scholar, Department of Computer Science Engineering, CT Group of institution, Shahpur,
Jalandhar, Punjab, India 144020
b,c
Assistant Professor, Department of Computer Science Engineering, CT Group of institution, Shahpur,
Jalandhar, Punjab, India 144020
a
Email: amanpreet.kamboj231@gmail.com
b
Email: sukhsain.17@gmail.com
c
Email: gunjan.ctit@gmail.com
Abstract
Steganography is the art of hiding of a message within another so that presence of hidden message is
indistinguishable. The key concept behind steganography is that message to be transmitted is not detectable to
the casual eye. This is also the advantage of steganography over cryptography. Modern digital steganography
uses text, images, audio, video etc. as a cover medium. This paper presents a mechanism of storing the secret
message using forward email platform and color mapping table. Various experiments have been conducted and
the results are analyzed in this paper.
Keywords: Steganography; cryptography; plain text; encryption; decryption; cipher.
1. Introduction
Almost all computer users write and exchange documents written with applications using proprietary document
formats such as Microsoft Office. Even though causes have not been addressed yet, it is well known among
communities of expert computer users that unexpected information may hide into those documents and can be
easily revealed. On the other hand, regular computer users are often unaware of the information leakage by their
published documents. Classical steganography concerns itself with ways of embedding a secret message (which
might be a copyright mark, or a covert communication, or a serial number) in a cover message (such as a video
film, an audio recording, or computer code). The embedding is typically parameterized by a key; without
knowledge of this key (or a related one) it is difficult for a third party to detect or remove the embedded material.
Once the cover object has material embedded in it, it is called a stego object. Thus, for example, we might embed
a mark in a cover text giving a stego text; or embed a text in a cover image giving a stego-image; and so on [14].
-----------------------------------------------------------------------
* Corresponding author.
brought to you by CORE View metadata, citation and similar papers at core.ac.uk
provided by International Journal of Computer (IJC - Global Society of Scientific Research and...