2011
DOI: 10.5121/ijnsa.2011.3616
|View full text |Cite
|
Sign up to set email alerts
|

Experimenting with the Novel Approaches in Text Steganography

Abstract: As is commonly known, the steganographic algorithms employ images, audio, video

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(23 citation statements)
references
References 9 publications
0
23
0
Order By: Relevance
“…In general, steganography techniques can be classified into different approaches such as image, text, audio and video steganography depending on the cover media that is used to embed the hidden data [7][8][9][10][11][12]14]. Moreover, text steganography is one of the oldest information hiding techniques, which is considered as the hardest cover media to use for steganography purpose due to less redundant information available inside the text files for hiding the data [7,8,10,11,[14][15][16].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In general, steganography techniques can be classified into different approaches such as image, text, audio and video steganography depending on the cover media that is used to embed the hidden data [7][8][9][10][11][12]14]. Moreover, text steganography is one of the oldest information hiding techniques, which is considered as the hardest cover media to use for steganography purpose due to less redundant information available inside the text files for hiding the data [7,8,10,11,[14][15][16].…”
Section: Related Workmentioning
confidence: 99%
“…In general, the steganography can be classified into several approaches, based on which cover media such as text, image, audio and video is used to hide the data [7][8][9][10]. Additionally, since text requires less memory and time to for processing the data, it has been used as a cover media for several years [2,3,11].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, several methods of feature coding that manipulated pattern letter is English grammar such Changing in Alphabet Letter Patterns method known as CALP is trying to utilize English letters by mapping the binary sequence of the hidden for embedding process of the cover text [16]. Then, based multiple character-based [17] such as curve-based, vertical-based (VERT) and quadruplebased (QUAD).…”
Section: Related Work On Text Steganographymentioning
confidence: 99%
“…2. Then, three techniques are considered as feature coding methods used as the stego keys namely Changing Alphabet Letter Patterns called CALP [16], Vertical Straight Line called VERT and Quadruple Categorization called QUAD [17].…”
Section: Fig 1 Visualization Of Experimental Designmentioning
confidence: 99%