2018
DOI: 10.11591/ijeecs.v11.i2.pp761-767
|View full text |Cite
|
Sign up to set email alerts
|

Analysis Review on Performance Metrics for Extraction Schemes in Text Steganography

Abstract: In today's era of big data computer networks, protection of secret messages when transmitting information is a major concern. The openness and publicity of the communication channel are the main attraction for malicious people to steal personal data even though privacy protection in operational. Data extraction is process that reverses the data embedding process in information hiding. However, the performance of an information hiding framework highly depends on the evaluation metrics used. The effectiveness of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 31 publications
(30 reference statements)
0
3
0
Order By: Relevance
“…The steganography system is considered practically secure if no attacks detect, destroy, or extract the hidden message [7,56,96].…”
Section: Securitymentioning
confidence: 99%
“…The steganography system is considered practically secure if no attacks detect, destroy, or extract the hidden message [7,56,96].…”
Section: Securitymentioning
confidence: 99%
“…A key controls the encryption of information in cryptography, so that no one can decrypt and access the information except the person who knows the key. Steganography is one of the best methods for secure communication [3]. The word steganography originates from the Greek language, which means hidden writing.…”
Section: Introductionmentioning
confidence: 99%
“…Then, capacity parameter is used in order to determine the size of IT system and adapted the system size with space of specific application that could be influence sytem performance [5]. Furthermore, robustness parameter is applied in order to avoid the risky error development and consider to safe and robust implementation that suitable is expected performance [6][7][8]. Moreover, The effectiveness is the capability of the system in order to perform the desired output [9].…”
Section: Introductionmentioning
confidence: 99%