2016
DOI: 10.1002/sec.1752
|View full text |Cite
|
Sign up to set email alerts
|

AH4S: an algorithm of text in text steganography using the structure of omega network

Abstract: This article introduces a new technique to hide text-in-text messages. The proposed mechanism uses the structure of omega network to hide and extract secret messages. The generation of secret message is made as follows, take every letter from the original message, use the omega network to generate two related letters from the selected letter, and finally search the dictionary for a suitable English cover word to hide the generated two letters. In order to increase the chance of find a suitable words, the gener… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(17 citation statements)
references
References 5 publications
0
17
0
Order By: Relevance
“…e information hiding is categorized into steganography, cryptography, and watermarking as shown in Figure 2. A secret message is embedded in digital content without affecting the original text, which authenticates the ownership verification [25,26].…”
Section: Digital Watermarkingmentioning
confidence: 99%
“…e information hiding is categorized into steganography, cryptography, and watermarking as shown in Figure 2. A secret message is embedded in digital content without affecting the original text, which authenticates the ownership verification [25,26].…”
Section: Digital Watermarkingmentioning
confidence: 99%
“…Discussed method concerns (among other issues) steganography of the text. In the literature, one can find many works on this subject, e.g., [20][21][22][23][24][25][26][27]. Most of them use large amounts of non-confidential information (media) to be able to hide in a piece of the confidential message.…”
Section: Steganography Of the Textmentioning
confidence: 99%
“…Thanks to horizontal or vertical symmetry of the alphabet characters, the corresponding bits of the confidential message are hidden, creating appropriately modified text. In turn, Reference [21] developed a method of hiding text using the omega network. This method consists of generating a word from a dictionary that contains two letters coupled using an omega network with one letter of messages to hide.…”
Section: Steganography Of the Textmentioning
confidence: 99%
“…Therefore, demand is growing for intelligence and multimedia security studies that involve not only encryption, but also covert communication whose essence lies in concealing data [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 ]. Recently, information hiding or data hiding in digital texts, known as text hiding, has drawn considerable attention due to its extensive usage, and potential applications in the cybersecurity and network communication industries [ 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 5...…”
Section: Introductionmentioning
confidence: 99%
“…During the last two decades, many text hiding algorithms have been introduced in terms of text steganography and text watermarking for covert communication [ 1 , 6 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 20 , 31 , 36 , 39 , 51 , 91 ], copyright protection [ 3 , 4 , 5 , 7 , 18 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 44 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 72 , 73 , 74 , 75 , 87 , <...>…”
Section: Introductionmentioning
confidence: 99%