Research Article
Disbursal of Text Steganography in the Space of Double-Secure Algorithm
(1) | Get a cover file | (2) | Convert the confidential message to its binary equivalent (bin) | (3) | Read a word from the cover file and write it in a stego file. | (4) | Skip that word that has the same start and end letters, and then, read the next word from the cover text | (5) | Repeat 4 times | (a) | Read a bit (x) from the bin b. | (b) | S = start letter of the word, and E = end letter of the word | (c) | If x = 0, write S in the stego key | (d) | Else if x = 1, write E in the stego key | (6) | End repeat | (7) | Repeat 3 to 6 times until the end of the bin file | (8) | Send the stego key and stego text to the receiver |
|