This paper is published in Volume-4, Issue-1, 2018
Area
Computer Engineering
Author
Swati Dandekar, Dr. Jyoti Rao
Org/Univ
DR. D. Y. Patil Institute of Technology, Pimpri, Pune, Maharashtra, India
Pub. Date
08 January, 2018
Paper ID
V4I1-1171
Publisher
Keywords
Text-Based Information Hiding, Invisible Character Replacement, Hash function, Information security

Citationsacebook

IEEE
Swati Dandekar, Dr. Jyoti Rao. Application of the Hash Function on Secret Message and Provide it Security with the Help of Invisible ASCII Character Replacement Technology, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Swati Dandekar, Dr. Jyoti Rao (2018). Application of the Hash Function on Secret Message and Provide it Security with the Help of Invisible ASCII Character Replacement Technology. International Journal of Advance Research, Ideas and Innovations in Technology, 4(1) www.IJARIIT.com.

MLA
Swati Dandekar, Dr. Jyoti Rao. "Application of the Hash Function on Secret Message and Provide it Security with the Help of Invisible ASCII Character Replacement Technology." International Journal of Advance Research, Ideas and Innovations in Technology 4.1 (2018). www.IJARIIT.com.

Abstract

Most widely used technique over the internet for communication is the text-document exchange. This text document may contain valuable data or some general information of any kind. If this text document contains some important information and if gets hacked then they may change information about it or may misuse that information. Because of all these reasons we need some technique for information hiding within a text document while communication over the internet. Although there are lots of text-based information hiding techniques present and proposed by many authors but these techniques have some drawbacks such as poor robustness, lower embedding rate, and semantic clutter. Due to all these flaws in the existing system many time the information is hacked or extracted by the interceptors. To mitigates all these drawbacks of existing system or techniques we proposed a new technique based on the hash function and the invisible ASCII character replacement method. In this approach, we first find the binary formatted information which is added by even numbers of 1’s for even parity, after that the space character in every carrier is replaced by SOH with the help of some replacement algorithm. In the third stage, a hash value is generated. At last the hash value is compared with the encoded secret information.