Loading

Features of using Invisible Signs in the Word Environment for Hiding Data
Zaynalov N.R1., Narzullaev U.Kh2., Muhamadiev A.N3., Bekmurodov U.B4., Mavlonov O.N5

1Zaynalov N.R., Department of Information Technologies, Tashkent University of Muhammad al-Khwarizmi, Uzbekistan.

2Narzullaev U.Kh., Department of Information Technologies, Tashkent University of Muhammad al-Khwarizmi, Uzbekistan.

3Muhamadiev A.N., Department of Information Technologies, Tashkent University of Muhammad al-Khwarizmi, Uzbekistan.

4Bekmurodov U.B., Department of Information Technologies, Tashkent University of Muhammad al-Khwarizmi, Uzbekistan.

5Mavlonov O.N, Department of Information Technologies, Tashkent University of Muhammad al-Khwarizmi, Uzbekistan.

Manuscript received on 09 July 2019 | Revised Manuscript received on 21 July 2019 | Manuscript Published on 23 August 2019 | PP: 1377-1379 | Volume-8 Issue-9S3 August 2019 | Retrieval Number: I32950789S319/2019©BEIESP | DOI: 10.35940/ijitee.I3295.0789S319

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Considered digital steganography is the direction of classical steganography based on concealing or introducing additional information into digital objects, while causing some distortions of these objects. At the same time, images, audio, video, network packets, etc. can be used as objects or containers. Recently, there has been a lot of publication in the field of information hiding in a text container. To embed a secret, steganographic methods rely on redundant information about the used covering media or properties that the human perception system cannot distinguish. Since text documents are widely used in organizations, using a text document as a storage medium may be the preferred choice in such an environment. On the other hand, the choice of using a text document as a storage medium is the most difficult, since it contains less redundant information. In this article, we present textual steganography using invisible characters in a word processor.

Keywords: Cryptography, Information hiding, Steganography, Text steganography
Scope of the Article: Cryptography and Applied Mathematics