HTML / XHTML Quick Reference. This document: http://www.utoronto.ca/ian/
books/extras/. Last Update: 7 November 2000. 1/2. The XHTML 1.0 Language
and ...
New Perspectives on HTML and XHTML, 5th Edition—. Comprehensive .... Take
some time reviewing the HTML code within each document so that you under-.
Dec 14, 2017 - Keywordsâ Steganography; HTML; white spaces; Special space codes; security; hidden capacity; imperceptibility. I. INTRODUCTION.
Na ovoj stranici želimo predstaviti logo TVZ-a. ... Logo TVZ-a sada ima dimenziju slike 150x70px i okvir 3px..
The Use of XML and XML-Data to Provide Document Understanding ... [OCR] for text, palette definition for photos, and raster to vector conversion .... DCD, DDML, HTML, PDF, RTF, SGML, SOX, XML, and XML-data formats and standards.
For Introduction to Java Programming. By Y. Daniel Liang. This supplement
introduces HTML and XHTML. XHTML is a new generation of HTML. Since
XHTML ...
HTML, XHTML, and CSS: Complete, 6th Edition, page: HTML51. No part of any
book may be reproduced or transmitted by any means without the publisher's ...
A Tutorial on XHTML and XML. Copyright 2008. Dr. Lixin Tao http://csis.pace.edu/
lixin. Pace University. Page 2. Page 3. Table of Contents. 1 Web Pages Using ...
Most steganography methods make use of pictures [4], video clips [5], and music and sounds [6]. Text is the most ..... Bridgeport, CT, USA, 2(2007), pp. 339â342.
PDF Download HTML, XHTML, and CSS: Complete Free Online, Download .... Free CSS Templates Why not download 2604 free web
Page 1. Download Best Book Principles of HTML, XHTML, and DHTML: The Web .... to add text and images to Web pages, how t
Download Best Book Beginning HTML, XHTML, CSS, and JavaScript, Download Online Beginning HTML, XHTML, CSS, and JavaScrip
as we prefer it across the pond, not-for-prof- its. Mrs. Morris has managed to get ... Chris Beckett now trading under the name of. Scholarly information Strategies ...
Sep 17, 2010 ... XHTML 1.0 Frameset (I lied, we only care about the first two; ... CSS stands for
Cascading Style Sheets, and is presentation code ... Linked style sheets (these
are separate files linked to the .html page in the tag). ✓.
... and interpreted PHP is a server side scripting language designed primarily for web development but also used as a ge
... technologies series Download principles of html xhtml and dhtml the web technologies series or read online .... Publ
Covers HTML5 and prior versions of HTML! 2nd Edition ... *Sweepstakes not
currently available in all countries; visit Dummies.com for official rules. Get More ...
Freeware Delphi components, open source Delphi libraries, databases, script engines, mi eware, internet components, comm
Download Best Book Principles of HTML, XHTML, and DHTML: The Web .... XHTML, AND DHTML teaches students the basics of bu
New Perspectives on HTML and XHTML 5th Edition. Tutorial 5. Review
Assignments. Programming Table Style Sheet. Author: Kyle Mitchell. Date: 3/1/
2011.
Principles of HTML, XHTML, and DHTML: The Web Technologies Series, Free ... and DHTML: The Web Technologies Series ,new
Technologies Series Full Pages - By Don Gosselin ..... to add text and images to Web pages, how to create frames, tables
html xhtml and css sixth edition pdf. html xhtml and css sixth edition pdf. Open. Extract. Open with. Sign In. Main menu
The doctype declaration is version information that appears as the first line of any
. HTML document. ... An HTML document is normally organized with the head,
title, and body tags as follows: .... document with css extension: fileName.css.
In this paper, we have focused on two main aspects of text .... S.Dey method [22] uses HTML tags to hiding data in an HTML We page. HTML tags are ...
International Journal on Information Technologies & Security, № 3, 2017
99
TEXT STEGANOGRAPHY UTILIZING XML, HTML AND XHTML MARKUP LANGUAGES Syed Imran, Aihab Khan, Basheer Ahmad Iqra University Islamabad Campus, Pakistan [email protected], [email protected], [email protected] Pakistan Abstract: Nowadays people use web pages and email to share secret information. To ensure the secure message transformation, we used cryptography in combination with Steganography to achieve the desire results. To improve security, the encrypted message is hiding in HTML, XML and XHTML. Our technique is implemented in two levels of randomness i.e. at the file level and content level and encrypted with AES to achieve the maximum security. In addition, the proposed technique is using Unicode languages to take a secret message and has better capacity than the existing methodologies as only two spaces are required to hide the one character. The results show our technique provides high hidden capacity and security than an existing algorithm. Key words: Steganography, Encryption, Carries Files, XML code, HTML code. 1. INTRODUCTION The internet has altered communication and there by its commitment to information sharing [1]. With access to a computer and a proper connection, anybody can interact with others around the world. However, the web is intended to trade unstructured information, while individuals can read web pages and extract the required information which he used [2].There are two major security techniques have been developed to ensure the exchange of information over internet, cryptography, and Steganography [3].Steganography comes from the Greek words “stages”, and means “roof or covering” and “graphic” which means “writing” [4].Steganography is an art that protects the existence of communication. The importance of Steganography is to hide messages in such a way, to make it impossible for unauthorized people to detect, and to distinguish between the shown instant messages [5]. In this paper, we have focused on two main aspects of text Steganography: Capacity is to measure the amount of information that can be hidden in the
100
International Journal on Information Technologies & Security, № 3, 2017
cover medium [6-12]. Our method can provide more capacity to hide more characters in the cover files. Security is a Steganography parameter that allows intended user to access information. It strongly powerless to the un-authorized user to identify covered up information [6-8, 10-13], the proposed algorithm provides high security to protect secret information. It provides three-layer security AES, Random file, and Random location. In this paper, a web page information hiding algorithm is presented. The website page can be coded by utilizing one of a few marks up languages (e.g., HTML, XML, XHTML, and so on). HTML, XML, AND XHTML are decent approaches to displaying a static website page that presents some data for a specified topic. An HTML, XHTML AND XML file is composed of tags (e.g. "", "
" and "" etc.) and contents. An English sentence is made out of words and the spaces between words. Cryptography and steganography are notable and generally utilized procedures that manipulate information in order to cipher or conceal their reality. These strategies have numerous applications in software engineering and other related fields. Cryptography is a study of mathematical systems that are identified as part of data security, such as confidentiality, information integrity, element identification, and information entry point identification[14]. There are numerous cryptography strategies accessible among them AES is one of the most effective methods. This standard uses a 128-bit encryption key to determine the Rijndael algorithm, which is a symmetric block cipher that can process 128-bit information blocks. The input, output, and encryption keys for Rijndael are each an array of bits containing 128 bits, and the input and output sequences must have similar lengths. When all is done, the length of the input and output groups can be one of three acceptable respects to the Advanced Encryption Standard (AES) with a main length of 128 allowed [15]. Bender et al. Method [16] are used one space represent "0" and two spaces used to represent "1". This plan appears between words. The main disadvantage of the Bender method is that it requires more space to hide some bits. Yang and Yang's method [17] is a web page-based data concealment technique. Yang and Yang methods use different properties to hide secret data such as quotes and hide secret bits "0" and double quotes are used to hide secret bits "1". In this way, you can hide secret data by using different attributes settings. The main drawback of this method is that the embedding capacity is limited by the limited number of tags attribute setting. Lee and Tsai's method [18] hide data that embeds secret data in web pages. First, Lee and Tsai discovered that empty spaces can be encoded with some special space codes. For instance, blank characters can be encoded using spaces & # XA0; & # 160 etc. Then they found that English contained a significant portion of the space between the two words. In this way, Lee and Tsai's method collects eight special spatial codes and constructs code that maps the secret bits.
International Journal on Information Technologies & Security, № 3, 2017
101
Table 1. Special Space Code used in Html used by Lee and Tsai's method No. Code in HTML Bits 1 Type space 000 2 001 3 010 4 011 5 100 6 101 7 110 8   111 9   unused After the specific point, the message that needs to be secured is changed in to further binary stream, and the bit stream is converted in to several uncovered bits. At the end, blank space between the two words is converted by a secret message and a mapping table. Table 1 clarifies the special space codes and mapping rules secret message. The main disadvantage of this method's special code is that it does not work correctly when the special code is linked in decimal. Chou et al.’s method [19] is a method of cooperating with special space codes and Cartesian production to hide data. Chou et al. Use twenty-five special universe codes to display the blank space of a web page. Remove the special space codes collected (see Table 2) and form the inclusion rules, including Cartesian production.
No. 0 1 2 3 4 5 6 7 8 9 10 11 12
Table 2 the special code of “Blank” character Code No. Code Type space 13 14 15 16 17 18 19 20 21 22 23 24 25
102
International Journal on Information Technologies & Security, № 3, 2017
This algorithm secret data embedded every blank space sequentially. This is a major drawback in security and efficiency. They can easily be detected and attacked. Huang et al. [20] are used a tag attribute permutation technique to hide confidential information and introduced a page data hiding strategy. Since some HTML tags have a few discretionary attributes that can be utilized to alter a webpage's substance introduction, the secret information can be embedded in a webpage by changing a tag's attribute values. As per Huang et al.’s method, the secret information should be changed over to a substantial number before being embedded. Sui and Luo’s method [21] uses the case of tag letters to cover secret information. So, the insertion capability of Sui and Luo's method is limited by the number of tags. To carry more secret information, more redundant tags are used. S.Dey method [22] uses HTML tags to hiding data in an HTML We page. HTML tags are case-insensitive; hence uppercase and lowercase alphabets inside an HTML tag are interpreted in the same manner. The drawback of S. Dey method is embedding capacity is limited due to limited tags of HTML. The rest of the paper is organized as follow: Section2 is relevant to problem statement that was in existing techniques. The proposed technique, "Text Steganography utilizing XML, HTML & XHTML Mark-up Languages", is described in detail in Section 3, and experimental results and analysis are presented in Section 4. Draw conclusions in Section 5 and discuss future research in Section 6. 2. PROBLEM STATEMENT We observed the following problems in existing technique [3] which we tried to solve in proposed solution. In above technique, it is clearly mentioned that it operates only on a single file which takes the secrete message only in one language and the data is stored in comments without using random function. Encryption process used in existing technique was not strong as it operates on XOR function. The entire problem leads to down the security level. In term of capacity, the existing approach hides information in bits which requires 126 bits for 15 characters to hide in each page. Therefore, it requires more space to cater the message. Most of the researchers are working on mark up languages to hide data in spaces between words using special codes. Our all experimental statistics are compared with Yang and Yang's method [17], Lee and Tsai's method [18] and Chou et al.’s method [19]. But the problems with above approaches are that they utilize only one file and requires more than 2 spaces to hide one character while the selection of spaces was consecutive, which makes message less secure and intruders can easily able to access secrete message. The techniques also require more spaces due to which the file size increases and impact on transmission time. Comparatively, it also takes more space on disk. In addition, the above discussed techniques using specific languages to encode information. Our proposed technique
International Journal on Information Technologies & Security, № 3, 2017
103
overcomes the above problems which reduce the transmission time by taking fewer spaces to hide on character and also improve security factor by utilizing randomization. The proposed method using Steganography along with cryptography to hide secrete message in HTML, XML and XHTML file. First of all, it encrypts the message take in Unicode language with AES and then implements two levels of randomness; file and content levels to achieve maximum security. It requires only two spaces to hide one character, which is better than traditional methods. 3. THE PROPOSED METHOD As described above, the previously proposed web page based data snooping method can successfully achieve secret message delivery. However, performance can be further enhanced in terms of embedding capability and security. Consider the attributes of HTML, XHTML, and XML, we proposed a Steganography technique having high embedding capacity and also provides three levels of security. At level 1, the algorithm took HTML, XHTML and XML files secrete message and encryption key. At level 2, one file is selecting randomly from abovementioned files. And at same level secrete information covert into cipher text. AES (128 bits) is used to convert the plain text to cipher. At level 3 encrypted messages are converted into ASCII code and then convert into space code. The number of spaces is count and two spaces are selecting randomly from the selected file and replace these spaces with special space codes. At the end updates the files. 3.1. Proposed Model
Fig. 1. Multiple file Steganography model.
104
International Journal on Information Technologies & Security, № 3, 2017
3.2. Embedding Algorithms This section describes the embedding and extraction algorithms. Embedding algorithm is used to hide confidential information in cover text on the sender side that resulting stage-object is transmitted through a communication channel. The receiver extracts secrete message using extraction algorithm and secrete key. Table 3 shows notation used in embedding and extraction algorithm. Table 3. Algorithmic notation Definition HTML file XHTML file XML FILE Secret Message Cipher Message Encryption Key Stego HTML file Stego xHTML file Stego XML FILE Number of Characters to Hide Total Spaces in file Total Number of Files Possibilities Total Possibilities Array of space codes Total Space Code in File
Notation H1 H2 H3 M M’ E H1’ H2’ H3’ Ct St Ft P Pt SC() Sc ct
Total Possibilities =
C n 1
st
2
(1)
Embedding algorithm (Table 4) takes HTML, xHTML and XML files as input along the secret message and encryption key. In Step 1 message M is encrypted by using AES and M’ is obtained. For loop start up in Step 2 which iterates Ct/2 times. In step 3 ith character is retrieved from the message. Step 4 select one file randomly among the given three files in each iteration of the loop. In Step 5 number of spaces of the selected file are calculated and stored in the St. In Step 6 on the basis of the St number of possibilities are calculated for the embedding the message and stored in Pi. In Step 7 cumulative possibilities are calculated. Step 9 select the space location randomly and store in Sl . ASCII code of target character is divided by the 10 and answer is stored in the d in step 11. Sl is replaced with SC(d) in step 12. The mod of ASCII code and 10 is calculated and the result is stored in r in step 12. In step 13 again we select the location Sl. Now Sl is replaced with SC(r). The whole process is repeated up to Ct/2 times. At the end of the process, the stego files are obtained.
International Journal on Information Technologies & Security, № 3, 2017
3.3. Extracting algorithm Extraction algorithm (Table 5) takes HTML, xHTML and XML stego files as input along and encryption key. For loop start up in Step 1 which iterates Ct/2 times. Step 2 select one file randomly among the given three files in each iteration of the loop. In Step 3 number of spaces of the selected file are calculated and stored in the St. In Step 4 number of space codes of the selected file are calculated and stored in the Sf. In step 5 sum of St and Sf is calculated. In Step 6 on the number of possibilities are calculated for the retrieving the message and stored in Pi. In Step 7 cumulative possibilities are calculated. Step 8 select the space location randomly and store in Sl . In step 9 index of space code at Sl is obtained and stored d. Space code at Sl is replaced with a space character in step 10. Step 11 select the space location randomly and store in Sl . In step 12 index of space code at Sl is obtained and stored r. Space code at Sl is replaced with a space character in step 13. Sl is replaced with SC (d) in step 12. The mod of ASCII code and 10 is calculated and the result is stored in r in step 12. In step 13 again we select the location Sl. d and r are concatenated and converted to the character which appended in M’. In M’ is decrypted to message M.
International Journal on Information Technologies & Security, № 3, 2017
3.4. Mark-up languages space code There are two types of spaces are used in Mark-up languages, normal spaces, and non-breaking spaces. The numeric character portrayal of these two classes of special characters appears as standard space in a web page. In these conditions, consider a modified number of one kind space codes and arranged in Table 6.
Sr. No. 1 2 3 4 5
Special Space code
Table 6. Mark-up Languages space codes Sr. No. Special Space code 6 7 nbsp; 8 9 10
International Journal on Information Technologies & Security, № 3, 2017
107
4. EXPERIMENTS AND RESULTS This section explores some of the results of applying algorithms and considering the concept of concealment ratio.
Fig. 2. Screen shot of embedding message
Fig. 3. Screenshot of extracting message Fig. 4 shows the stego HTML created by the proposed method. The experimental results demonstrate that it would be exceptionally trying for a user to recognize the contrast between the first HTML and the stego HTML by utilizing just the human eye.
108
International Journal on Information Technologies & Security, № 3, 2017
Fig. 4. the stego HTML file generated by the proposed method
Fig. 5. the source code of the stego HTML file Fig.6 shows the stego XHTML created by the proposed method by utilizing popular browser Google Chrome. It is difficult to recognize the distinction by utilizing the human eye.
Fig. 6. The stego XHTML file generated by the proposed method
International Journal on Information Technologies & Security, № 3, 2017
109
Fig. 7. The source code of the stego XHTML file Fig. 8 demonstrates the stego XML made by the proposed strategy. The experimental results exhibit that it would be uncommonly striving for a user to perceive the difference between the primary XML and the stego XML by using only the human eye.
Fig. 8 The stego XML file generated by the proposed method
International Journal on Information Technologies & Security, № 3, 2017
110
Fig. 9. The source code of the stego XML file 4.1. Capacity analysis Our proposed method embedding capacity is far much better than previous techniques. It is observed that our proposed techniques need only 2 spaces to embed one secret character as shown in Table 7. We compared proposed technique with Lee Tsai, Yang and Yang's and Chou et al.’s. Table 7. Capacity analysis of different techniques Numbers of Spaces Required
No. of characters
Proposed
Lee Tsai [14]
178
356
223
534
Yang and Yang’s [16] 712
Chou et al.’s. [16] 534
446
669
892
669
251
502
753
1004
753
312
624
936
1248
936
416
832
1248
1664
1248
481
962
1443
1924
1443
521
1042
1563
2084
1563
International Journal on Information Technologies & Security, № 3, 2017
111
It clearly is shown that the Lee Tsae , Yang and Yang’s and Chou et al.’s technique require three space to embed one character and yang requires 4 spaces to embed one character.
Fig. 10. shows the comparison of capacity analysis between the proposed method and Lee and Tsai’s, yang and Yang’s and Chou et al.’s methods. 4.2. Capacity ratio We have also analyzed our technique in terms of capacity ratio. The experimental results show in Table 8 that embedding ratio of proposed technique is much better than three techniques. To calculate the capacity ratio, we use following formula: Capacity Ratio=
Number cf character to embed Re quired spaces in carrier files
(2)
Table 8. Capacity ratio of different techniques Capacity ratio Proposed
Lee Tsai
Yang and Yang's
Chou et al.'s
0.5
0.3333333
0.25
0.333333333
0.5
0.3333333
0.25
0.333333333
0.5
0.3333333
0.25
0.333333333
0.5
0.3333333
0.25
0.333333333
0.5
0.3333333
0.25
0.333333333
112
International Journal on Information Technologies & Security, № 3, 2017
Fig. 11. show the comparison of the capacity ratio between the proposed method and Lee and Tsai’s, yang and Yang’s and Chou et al.’s methods. 4.3. Security analysis As far as the security of our proposed technique is concerned it is worth mentioning here that our security is very high as it comprises on 3 different levels. In first level, we randomly select the file and at second level we take the secret message in encrypted form. For the encryption AES (128 bits) is used. If eaves retrieve the secrete message from the Stego still it is impossible to decrypt the message without knowing the encryption key. In the third level, we randomly select a location from selected file and embedded the confidential information. In Table 4.5 we have shared full analysis of security for example if we have 38 characters of secret information which requires 76 spaces as we consider 2 spaces for one character. A total number of available spaces is 150. If we calculate total possibilities to embed the data we use this formula:
n! (3) r!(n r )! Here n is total available spaces in files; "r" is required spaces , here r=2, which remain same in every loop and result comes 11175. And in last we also share hacking possibilities in the below table which is calculated simply by multiplying the factorial of character which you want to embed to total possibilities using below formula. Total Probability to embed data=
ct
Total hacking probability = C!
n
C
r
C n 1
st
2
Here C is a number of characters which you want to embed. "n" is a total available space. "r" is total required spaces to hide data. "st" is spaces of selected file.
(4)
International Journal on Information Technologies & Security, № 3, 2017
113
It is clearly observed here by using above formula we have reduced the chances of hacking our code as it is very difficult for an intruder to check all possibilities to intrude in the code as it takes a long time. Table 9.shows security analysis Total Number Total Number of Spaces Hacking of Spaces in Possibilities Characters Required Possibilities Files to embed data 38 76 150 11175 5.84478E+48 45 90 135 9045 1.08198E+60 51 102 159 12561 1.94836E+70 63 126 160 12720 2.52188E+91 69 138 168 14028 2.4005E+102
Fig.12. shows the probability to embed data of the proposed method. Embeding vs Hacking Probability
Hacking Possibilities
7E+102 6E+102
Total Possibilities to embbed data Hacking Possibilities
5E+102 4E+102 3E+102
2E+102 1E+102 0 11476
16110
20706
31626
37950
Fig.13. shows the probability to hacking information of the proposed method.
International Journal on Information Technologies & Security, № 3, 2017
114
5. CONCLUSION Other algorithms have been provided to hide information in text files. Some of these methods are designed to be implemented in specific languages, such as English, Urdu, and Arabic, but other languages can be implemented regardless of language. This paper presents a promising algorithm that can be implemented in the Unicode language via XML, HTML, and XHTML. Our algorithms provide higher hidden capacity than other algorithms. For example, the algorithm provides robustness and security with hidden information embedded within the spaces and the Internet browser does not show it. In addition, our algorithms use encryption mechanisms to improve transparency. 6. FUTURE WORK Our proposed algorithm is highly secure to enhance more security and transparency we can apply a random function on secret message, which enables method more secure and reliable. REFERENCES [1] V. Chaudhri and J. Wang, "Communicating corporate social responsibility on the internet: A case study of the top 100 information technology companies in India," Management Communication Quarterly, vol. 21, pp. 232-247, 2007. [2] A. C. Weaver and B. B. Morrison, "Social networking," Computer, vol. 41, 2008. [3] A. Odeh, K. Elleithy, M. Faezipour, and E. Abdelfattah, "Novel Steganography over HTML Code," in Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering, ed: Springer, 2015, pp. 607-611. [4] A. G. Memon, S. Khawaja, and A. Shah, "Steganography: A new horizon for safe communication through XML," Journal of Theoretical and Applied Information Technology, vol. 4, pp. 187-202, 2008. [5] Y. G. Latika1 Latika "An Efficient Technique of Steganography," International Journal of Science and Research (IJSR), vol. 4, pp. 842-846, 2015. [6] A. T. Abbasi, S. N. Naqvi, A. Khan, and B. Ahmad, "Urdu text steganography: Utilizing isolated letters," 2015. [7] M. Aman, A. Khan, B. Ahmad, and S. Kouser, A Hybrid Text Steganography Approache Utilizing Unicode Space Characters and Zero-Width Character, International Journal on Information Technologies and Security, vol. 9, No. 1, 2017, pp. 85-100.
International Journal on Information Technologies & Security, № 3, 2017
115
A Hybrid Text Steganography Approache Utilizing Unicode Space Characters and Zero-Width Character, International Journal on Information Technologies and Security, vol. 9, No. 1, 2017, pp. 85-100. [8] K. P. Chintan Dhanani, Mtech Scholar, "Steganography using web documents as a carrier: A Survey," NTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH ( IJEDR ), vol. 2, pp. 172179, 2013. [9] S. K. Dey and M. T. Nandy, "A SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM," International Journal of Computer Science vol. 2, pp. 33-36, 2014. [10] R. Gupta, S. Gupta, and A. Singhal, "Importance and techniques of information hiding: A review," arXiv preprint arXiv:1404.3063, 2014. [11] M. Hariri, R. Karimi, and M. Nosrati, "An introduction to steganography methods," World Applied Programming, vol. 1, pp. 191-195, 2011. [12] U. Khadim, A. Khan, B. Ahmad, and A. Khan, "Information Hiding in Text to Improve Performance for Word Document," International Journal of Technology and Research, vol. 3, p. 50, 2015. [13] S. K. Dey and M. T. Nandy, "A SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM." [14] D. D. Bloisi and L. Iocchi, "Image based steganography and cryptography," in VISAPP (1), 2007, pp. 127-134. [15] D. K. Sarmah and N. Bajpai, "Proposed System for data hiding using Cryptography and Steganography," International Journal of Computer Applications, vol. 8, pp. 7-10, 2010. [16] L. Y. Por, B. Delina, Q. Li, S. Chen, and A. Xu, "Information hiding: A new approach in text steganography," in WSEAS International Conference. Proceedings. Mathematics and Computers in Science and Engineering, 2008. [17] Y.-C. Chou, P.-K. Hsu, and I.-C. Lin, "Data Hiding for HTML Files Using Character Coding Table and Index Coding Table," TIIS, vol. 7, pp. 2913-2927, 2013. [18] I.-S. Lee and W.-H. Tsai, "Secret communication through web pages using special space codes in HTML files," International Journal of Applied Science and Engineering, vol. 6, pp. 141-149, 2008. [19] Y. C. Chou and H. C. Liao, "A Webpage Data Hiding Method by Using Tag and CSS Attribute Setting," in Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on, 2014, pp. 122-125.
116
International Journal on Information Technologies & Security, № 3, 2017
[20] H. Huang, S. Zhong, and X. Sun, "An algorithm of webpage information hiding based on attributes permutation," in Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP'08 International Conference on, 2008, pp. 257-260. [21] X.-G. Sui and H. Luo, "A new steganography method based on hypertext," in Radio Science Conference, 2004. Proceedings. 2004 Asia-Pacific, 2004, pp. 181-184. [22] S. Dey, H. Al-Qaheri, and S. Sanyal, "Embedding secret data in html web page," arXiv preprint arXiv:1004.0459, 2010. Information about the authors: Syed Imran Hussain Shah – MSCS Student at Iqra University Islamabad Campus implemented this project for his final year thesis. The area of interest is information security. Dr. Aihab Khan – Working as Associate Professor at Iqra University Islamabad Campus. The project has been implemented under his supervision. His area of interest is Information Systems (Business Informatics), Computer Communications (Networks), Computer Security and Reliability. Dr. Basheer Ahmad – Working as Professor of statistics and HOD of Management Sciences Department at Iqra University Islamabad Campus. His area of interest is Analysis, Statistics, and Probability Theory. Manuscript received on 21 June 2017