2021
DOI: 10.3390/app11156851
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Analysis of Arabic Text Steganography

Abstract: Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. As text uses low bandwidth, it is commonly used by Internet users in their daily activities, resulting a vast amount of text messages sent daily as social media posts and documents. Accordingly, text is the ideal object to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 97 publications
0
5
0
Order By: Relevance
“…However, inserting Unicode characters led to an increase in the stego text size, which can detect by most word editors. Moreover, most Unicode text steganography techniques suffer from low capacity [10]. White-space-based used to hide information in the text by inserting extra space between words and at the end of a line or a paragraph [49][50][51][52][53][54].…”
Section: B Text Steganographymentioning
confidence: 99%
See 3 more Smart Citations
“…However, inserting Unicode characters led to an increase in the stego text size, which can detect by most word editors. Moreover, most Unicode text steganography techniques suffer from low capacity [10]. White-space-based used to hide information in the text by inserting extra space between words and at the end of a line or a paragraph [49][50][51][52][53][54].…”
Section: B Text Steganographymentioning
confidence: 99%
“…This can be measured by computing the number of used characters in the cover text. The following formula is used to calculate the usage ratio [10,[74][75][76]:…”
Section: B Bit Per Locationsmentioning
confidence: 99%
See 2 more Smart Citations
“…These format-based techniques can fool humans, but they are unable to fool computer programs or make the stego text longer. Moreover, these techniques exhibit reduced resilience to text retyping attacks which makes it simple to lose the hidden data [11], [12].…”
Section: Introductionmentioning
confidence: 99%