An Approach of Quantum Steganography through Special SSCE Code

Encrypted messages sending frequently draws the attention of third parties, perhaps causing attempts to break and reveal the original messages. Steganography is introduced to hide the existence of the communication by concealing a secret message in an appropriate carrier like text, image, audio or video. Quantum steganography where the sender (Alice) embeds her steganographic information into the cover and sends it to the receiver (Bob) over a communication channel. Alice and Bob share an algorithm and hide quantum information in the cover. An eavesdropper (Eve) without access to the algorithm can-t find out the existence of the quantum message. In this paper, a text quantum steganography technique based on the use of indefinite articles (a) or (an) in conjunction with the nonspecific or non-particular nouns in English language and quantum gate truth table have been proposed. The authors also introduced a new code representation technique (SSCE - Secret Steganography Code for Embedding) at both ends in order to achieve high level of security. Before the embedding operation each character of the secret message has been converted to SSCE Value and then embeds to cover text. Finally stego text is formed and transmits to the receiver side. At the receiver side different reverse operation has been carried out to get back the original information.




References:
[1] Correlation and dependence. [Online]. Available: http :
//en.wikipedia.org/wiki/Correlationanddependence.
[2] Spy gadgets in world war ii: Microdots, 2007.
http://www.mi5.gov.uk/output/Page303.html, Feb. 15, 2008.
[3] Dr. Mohammed Al-Mualla and Prof. Hussain Al-Ahmad. Information
hiding: Steganography and watermarking. [Online]. Available: http :
//www.emirates.org/ieee/informationhiding.pdf..
[4] Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography.
IEEE Journal on Selected Areas in Communications (J-SAC),
Special Issue on Copyright and Privacy Protection, 16:474-481, 1998.
[5] K. Bennett. Linguistic steganography: Survey, analysis, and robustness
concerns for hiding information in text. Purdue University, CERIAS
Tech. Report, 2004.
[6] Kran Bailey Kevin Curran. An evaluation of image based steganography
methods. 1999.
[7] Kran Bailey Kevin Curran. An evaluation of image based steganography
methods. International Journal of Digital Evidence,Fall 2003, 2003.
[8] M. Curty and D. J. Santos. 2nd Bielefeld Workshop on Quantum
Information and Complexity, 2000.
[9] D. Deutsch. Quantum computational networks. Proc. Roy. Soc. Lond.
A, 425 (1989), 73-90.
[10] D. Deutsch. Quantum theory, the church-turing principle and the
universal quantum computer. Proc. Roy. Soc. Lond. A, 400 (1985),
97-117.
[11] G. Doerr and J.L. Dugelay. A guide tour of video watermarking. Signal
Processing: Image Communication., 18:263-282, 2003.
[12] G. Doerr and J.L. Dugelay. Security pitfalls of framebyframe approaches
to video watermarking. IEEE Transactions on Signal Processing,
Supplement on Secure Media., 52:2955-2964, 2004.
[13] S. Dowdy and S. Wearden. Statistics for research. Wiley. ISBN
0471086029, page 230, 1983.
[14] Ross J. Anderson Fabien A. P. Petitcolas and Markus G.Kuhn. title =.
[15] R. P. Feynman. Quantum mechanical computers. Found. Phys. 16
(1986), 507.
[16] J. Gea-Banacloche. Journal of Mathematical Physics, pages 43, 4531,
2002.
[17] M. A. Jaro. Advances in record linking methodology as applied to
the 1985 census of tampa florida. Journal of the American Statistical
Society., 84:414-420, 1989.
[18] M. A. Jaro. Probabilistic linkage of large public health data file. statistics
in medicine. Journal of the American Statistical Society., 14:491-498,
1995.
[19] Z. Duric N. F. Johnson and S. Jajodia. Information hiding: Steganography
and digital watermarking - attacks and countermeasures. Kluwer
Academic, 2001.
[20] D. Kahn. The codebreakers - the comprehensive history of secret
communication from ancient times to the internet. Scribner, 1996.
[21] K. Martin. Lecture Notes in Computer Science, pages 4567, 32, 2008.
[22] Ashok Muthukrishnan. Classical and quantum logic gates: An introduction
to quantum computing. Quantum Information Seminar(Friday, Sep.
3, 1999), Rochester Center for Quantum Information (RCQI).
[23] S. Natori. Quantum computation and information. Topics in Applied
Physics(Springer, Berlin/Heidelberg), 102:235-240, 2006.
[24] S. Low N.F. Maxemchuk J.T. Brassil and L. O.Gorman. Electronic
marking and identification techniques to discourage document copying.
IEEE Journal on Selected Areas in Communications, 13:1495-1504,
1995.
[25] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE
Computer, 16:26-34, 1998.
[26] Indradip Banerjee. Souvik Bhattacharyya. A novel approach for the
design of secure image based steganographic model. International
Journal BITM Transactions on EECC(ISSN No.: 0974-9527), 1:483-
490, August-December 2009.
[27] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. A survey
of steganography and steganalysis technique in image, text, audio and
video as cover carrier. Journal of Global Research in Computer Science,
2, April 2011.
[28] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. The text
steganography using article mapping technique(amt) and ssce. Journal
of Global Research in Computer Science, 2, April 2011.
[29] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. Data
hiding through multi level steganography and ssce. Journal of Global
Research in Computer Science, 2, February 2011.
[30] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. Implementation
of a novel text based steganography model. In National
Conference on Computing and Systems (NACCS), Dept. of Computer
Science, The University of Burdwan, Burdwan,India., Jan 29, 2010.
[31] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. Novel
text steganography through special code generation. In Proceedings
of International Conference on Systemics,Cybernetics and Informatics
(ICSCI-2011), Hyderabad,India., Jan 5-8, 2011.
[32] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. Design
and implementation of a secure text based steganography model. In
9th annual Conference on Security and Management (SAM) under
The 2010 World Congress in Computer Science,Computer Engineering
and Applied Computing(WorldComp 2010), LasVegas,USA, July 12-
15,2010.
[33] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. A novel
approach of secure text based steganography model using word mapping
method(wmm). International Journal of Computer and Information
Engineering 4:2 2010 - World Academy of Science, Engineering and
Technology (WASET), 4:96103, Spring 2010.
[34] Indradip Banerjee Souvik Bhattacharyya, Arka Prokash Mazumdar and
Gautam Sanyal. Text steganography using formatting character spacing.
IJICS, 13, Decembar, 2010.
[35] S.P.Mohanty. Digital watermarking: A tutorial review. International
Journal of Digital Evidence, Fall 2003, 2003.
[36] JHP Eloff T Mrkel and MS Olivier. An overview of image steganography.
In Proceedings of the fifth annual Information Security South
Africa Conference, South Africa, 2005.
[37] W. E. Winkler. The state of record linkage and current research
problems. Statistics of Income Division, Internal Revenue Service
Publication R99/04., 1999.