Downloads provided by UsageCounts
{"references": ["Correlation and dependence. [Online]. Available: http :\n//en.wikipedia.org/wiki/Correlationanddependence.", "Spy gadgets in world war ii: Microdots, 2007.\nhttp://www.mi5.gov.uk/output/Page303.html, Feb. 15, 2008.", "Dr. Mohammed Al-Mualla and Prof. Hussain Al-Ahmad. Information\nhiding: Steganography and watermarking. [Online]. Available: http :\n//www.emirates.org/ieee/informationhiding.pdf..", "Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography.\nIEEE Journal on Selected Areas in Communications (J-SAC),\nSpecial Issue on Copyright and Privacy Protection, 16:474-481, 1998.", "K. Bennett. Linguistic steganography: Survey, analysis, and robustness\nconcerns for hiding information in text. Purdue University, CERIAS\nTech. Report, 2004.", "Kran Bailey Kevin Curran. An evaluation of image based steganography\nmethods. 1999.", "Kran Bailey Kevin Curran. An evaluation of image based steganography\nmethods. International Journal of Digital Evidence,Fall 2003, 2003.", "M. Curty and D. J. Santos. 2nd Bielefeld Workshop on Quantum\nInformation and Complexity, 2000.", "D. Deutsch. Quantum computational networks. Proc. Roy. Soc. Lond.\nA, 425 (1989), 73-90.\n[10] D. Deutsch. Quantum theory, the church-turing principle and the\nuniversal quantum computer. Proc. Roy. Soc. Lond. A, 400 (1985),\n97-117.\n[11] G. Doerr and J.L. Dugelay. A guide tour of video watermarking. Signal\nProcessing: Image Communication., 18:263-282, 2003.\n[12] G. Doerr and J.L. Dugelay. Security pitfalls of framebyframe approaches\nto video watermarking. IEEE Transactions on Signal Processing,\nSupplement on Secure Media., 52:2955-2964, 2004.\n[13] S. Dowdy and S. Wearden. Statistics for research. Wiley. ISBN\n0471086029, page 230, 1983.\n[14] Ross J. Anderson Fabien A. P. Petitcolas and Markus G.Kuhn. title =.\n[15] R. P. Feynman. Quantum mechanical computers. Found. Phys. 16\n(1986), 507.\n[16] J. Gea-Banacloche. Journal of Mathematical Physics, pages 43, 4531,\n2002.\n[17] M. A. Jaro. Advances in record linking methodology as applied to\nthe 1985 census of tampa florida. Journal of the American Statistical\nSociety., 84:414-420, 1989.\n[18] M. A. Jaro. Probabilistic linkage of large public health data file. statistics\nin medicine. Journal of the American Statistical Society., 14:491-498,\n1995.\n[19] Z. Duric N. F. Johnson and S. Jajodia. Information hiding: Steganography\nand digital watermarking - attacks and countermeasures. Kluwer\nAcademic, 2001.\n[20] D. Kahn. The codebreakers - the comprehensive history of secret\ncommunication from ancient times to the internet. Scribner, 1996.\n[21] K. Martin. Lecture Notes in Computer Science, pages 4567, 32, 2008.\n[22] Ashok Muthukrishnan. Classical and quantum logic gates: An introduction\nto quantum computing. Quantum Information Seminar(Friday, Sep.\n3, 1999), Rochester Center for Quantum Information (RCQI).\n[23] S. Natori. Quantum computation and information. Topics in Applied\nPhysics(Springer, Berlin/Heidelberg), 102:235-240, 2006.\n[24] S. Low N.F. Maxemchuk J.T. Brassil and L. O.Gorman. Electronic\nmarking and identification techniques to discourage document copying.\nIEEE Journal on Selected Areas in Communications, 13:1495-1504,\n1995.\n[25] N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE\nComputer, 16:26-34, 1998.\n[26] Indradip Banerjee. Souvik Bhattacharyya. A novel approach for the\ndesign of secure image based steganographic model. International\nJournal BITM Transactions on EECC(ISSN No.: 0974-9527), 1:483-\n490, August-December 2009.\n[27] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. A survey\nof steganography and steganalysis technique in image, text, audio and\nvideo as cover carrier. Journal of Global Research in Computer Science,\n2, April 2011.\n[28] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. The text\nsteganography using article mapping technique(amt) and ssce. Journal\nof Global Research in Computer Science, 2, April 2011.\n[29] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. Data\nhiding through multi level steganography and ssce. Journal of Global\nResearch in Computer Science, 2, February 2011.\n[30] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. Implementation\nof a novel text based steganography model. In National\nConference on Computing and Systems (NACCS), Dept. of Computer\nScience, The University of Burdwan, Burdwan,India., Jan 29, 2010.\n[31] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. Novel\ntext steganography through special code generation. In Proceedings\nof International Conference on Systemics,Cybernetics and Informatics\n(ICSCI-2011), Hyderabad,India., Jan 5-8, 2011.\n[32] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. Design\nand implementation of a secure text based steganography model. In\n9th annual Conference on Security and Management (SAM) under\nThe 2010 World Congress in Computer Science,Computer Engineering\nand Applied Computing(WorldComp 2010), LasVegas,USA, July 12-\n15,2010.\n[33] Indradip Banerjee Souvik Bhattacharyya and Gautam Sanyal. A novel\napproach of secure text based steganography model using word mapping\nmethod(wmm). International Journal of Computer and Information\nEngineering 4:2 2010 - World Academy of Science, Engineering and\nTechnology (WASET), 4:96103, Spring 2010.\n[34] Indradip Banerjee Souvik Bhattacharyya, Arka Prokash Mazumdar and\nGautam Sanyal. Text steganography using formatting character spacing.\nIJICS, 13, Decembar, 2010.\n[35] S.P.Mohanty. Digital watermarking: A tutorial review. International\nJournal of Digital Evidence, Fall 2003, 2003.\n[36] JHP Eloff T Mrkel and MS Olivier. An overview of image steganography.\nIn Proceedings of the fifth annual Information Security South\nAfrica Conference, South Africa, 2005.\n[37] W. E. Winkler. The state of record linkage and current research\nproblems. Statistics of Income Division, Internal Revenue Service\nPublication R99/04., 1999."]}
Encrypted messages sending frequently draws the attention of third parties, perhaps causing attempts to break and reveal the original messages. Steganography is introduced to hide the existence of the communication by concealing a secret message in an appropriate carrier like text, image, audio or video. Quantum steganography where the sender (Alice) embeds her steganographic information into the cover and sends it to the receiver (Bob) over a communication channel. Alice and Bob share an algorithm and hide quantum information in the cover. An eavesdropper (Eve) without access to the algorithm can-t find out the existence of the quantum message. In this paper, a text quantum steganography technique based on the use of indefinite articles (a) or (an) in conjunction with the nonspecific or non-particular nouns in English language and quantum gate truth table have been proposed. The authors also introduced a new code representation technique (SSCE - Secret Steganography Code for Embedding) at both ends in order to achieve high level of security. Before the embedding operation each character of the secret message has been converted to SSCE Value and then embeds to cover text. Finally stego text is formed and transmits to the receiver side. At the receiver side different reverse operation has been carried out to get back the original information.
SSCE (Secret SteganographyCode for Embedding), Security, Quantum Steganography, Cover Text, Stego Text.
SSCE (Secret SteganographyCode for Embedding), Security, Quantum Steganography, Cover Text, Stego Text.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 3 | |
| downloads | 17 |

Views provided by UsageCounts
Downloads provided by UsageCounts