Research Article
Disbursal of Text Steganography in the Space of Double-Secure Algorithm
(1) | Read the word from the stego file | (2) | If the start and end letter of the word are the same, then skip it and read the next word from the stego file | (3) | Select the beginning and end character of the word | (a) | Read the letter from the stego key | (b) | If c = s, then b = 0 | (c) | Else if c = e, then b = 1 | (4) | Repeat four times | (5) | End repeat | (6) | Write b to file | (7) | Execute the abovementioned file till the end of the key | (8) | Convert the binary file to the character file |
|