2014 9th International Forum on Strategic Technology (IFOST) 2014
DOI: 10.1109/ifost.2014.6991061
|View full text |Cite
|
Sign up to set email alerts
|

Developing an efficient solution to information hiding through text steganography along with cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…EAST encryption/ decryption algorithm is solely capable of providing enough security [42] , but for a more critical situation, it is combined with a steganography algorithm to render more security. In EAST, secret data is first encrypted by the EAST block cipher encryption algorithm using the symmetric key, and then the resultant cipher text is embedded in a text file using the EAST text steganography algorithm [34]. Finally, this stego file is used for transmission, and at the other end, the ciphertext is extracted from a stego file and then passed to a decryption algorithm that gives the original secret text [45] .…”
Section: Proposed Workmentioning
confidence: 99%
“…EAST encryption/ decryption algorithm is solely capable of providing enough security [42] , but for a more critical situation, it is combined with a steganography algorithm to render more security. In EAST, secret data is first encrypted by the EAST block cipher encryption algorithm using the symmetric key, and then the resultant cipher text is embedded in a text file using the EAST text steganography algorithm [34]. Finally, this stego file is used for transmission, and at the other end, the ciphertext is extracted from a stego file and then passed to a decryption algorithm that gives the original secret text [45] .…”
Section: Proposed Workmentioning
confidence: 99%
“…Meanwhile, by using the letter-based technique, the scheme will have a high capacity and a robustness performance scheme. [9]. The characters for the secret message is converted to its binary, then it will replaced by the ASCII characters [10].…”
Section: Feature-based Techniquementioning
confidence: 99%
“…There are various type of extraction performance criteria frequently used in data hiding. Security [9], [11]- [19] S Imperceptibility [11], [20] IM Capacity [11]- [13][21]- [23] C Robust [9], [19], [24] R Efficiency [16], [18], [25] E Invisibility [26] IN Accuracy [27], [28] AC Speed [15] SP Complexity [21] CP Reversibility [25], [29] RV Realitibility RL Integrity [24], [30] IG Perceptibility [11] PC Assumption [24] AS Confidentiality [31] CF Availability [32] V…”
Section: Review Criteriamentioning
confidence: 99%