Emoticon-based steganography for securing sensitive data

Tohari Ahmad, Gregory Sukanto, Hudan Studiawan, Waskitho Wibisono, Royyana M. Ijtihadie

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Transferring information between nodes in this digital era has been made it easy for users to communicate. Sensitive data, however, requires protection during transmission to prevent unauthorized users from exploiting it. In this paper, we propose to hide secret data by developing emoticon-based steganography. Here, the data is embedded to the emoticon which is sent along with the cover text via chatting. The experimental result, which is obtained from various types of data, depicts that this proposed method, in general, has higher performance than that of existing one. That is, each emoticon has been able to dynamically hold more information. Specifically, the method without preprocessing is better.

Original languageEnglish
Title of host publicationProceedings - 2014 6th International Conference on Information Technology and Electrical Engineering
Subtitle of host publicationLeveraging Research and Technology Through University-Industry Collaboration, ICITEE 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479953035
DOIs
Publication statusPublished - 12 Jan 2014
Event6th International Conference on Information Technology and Electrical Engineering, ICITEE 2014 - Yogyakarta, Indonesia
Duration: 7 Oct 20148 Oct 2014

Publication series

NameProceedings - 2014 6th International Conference on Information Technology and Electrical Engineering: Leveraging Research and Technology Through University-Industry Collaboration, ICITEE 2014

Conference

Conference6th International Conference on Information Technology and Electrical Engineering, ICITEE 2014
Country/TerritoryIndonesia
CityYogyakarta
Period7/10/148/10/14

Keywords

  • data hiding
  • data security
  • steganography

Fingerprint

Dive into the research topics of 'Emoticon-based steganography for securing sensitive data'. Together they form a unique fingerprint.

Cite this