1 International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) © Global Society of Scientific Research and Researchers http://ijcjournal.org/ A Study on Text Based Steganography Using Email Platform and Color Mapping Amanpreet Kaur a* , Sukhvir Kaur b , Gunjan Sethi c a Research Scholar, Department of Computer Science Engineering, CT Group of institution, Shahpur, Jalandhar, Punjab, India 144020 b,c Assistant Professor, Department of Computer Science Engineering, CT Group of institution, Shahpur, Jalandhar, Punjab, India 144020 a Email: amanpreet.kamboj231@gmail.com b Email: sukhsain.17@gmail.com c Email: gunjan.ctit@gmail.com Abstract Steganography is the art of hiding of a message within another so that presence of hidden message is indistinguishable. The key concept behind steganography is that message to be transmitted is not detectable to the casual eye. This is also the advantage of steganography over cryptography. Modern digital steganography uses text, images, audio, video etc. as a cover medium. This paper presents a mechanism of storing the secret message using forward email platform and color mapping table. Various experiments have been conducted and the results are analyzed in this paper. Keywords: Steganography; cryptography; plain text; encryption; decryption; cipher. 1. Introduction Almost all computer users write and exchange documents written with applications using proprietary document formats such as Microsoft Office. Even though causes have not been addressed yet, it is well known among communities of expert computer users that unexpected information may hide into those documents and can be easily revealed. On the other hand, regular computer users are often unaware of the information leakage by their published documents. Classical steganography concerns itself with ways of embedding a secret message (which might be a copyright mark, or a covert communication, or a serial number) in a cover message (such as a video film, an audio recording, or computer code). The embedding is typically parameterized by a key; without knowledge of this key (or a related one) it is difficult for a third party to detect or remove the embedded material. Once the cover object has material embedded in it, it is called a stego object. Thus, for example, we might embed a mark in a cover text giving a stego text; or embed a text in a cover image giving a stego-image; and so on [14]. ----------------------------------------------------------------------- * Corresponding author. brought to you by CORE View metadata, citation and similar papers at core.ac.uk provided by International Journal of Computer (IJC - Global Society of Scientific Research and...