2019
DOI: 10.11591/eei.v8i1.1441
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis on secured data method in natural language steganography

Abstract: The rapid amount of exchange information that causes the expansion of the internet during the last decade has motivated that a research in this field. Recently, steganography approaches have received an unexpected attention. Hence, the aim of this paper is to review different performance metric; covering the decoding, decrypting and extracting performance metric. The process of data decoding interprets the received hidden message into a code word. As such, data encryption is the best way to provide a secure co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Steganoraphy is the scientific knowledge information that hide the hidden message implementation in several media that are unrecognized by human vision [4]. The steganography impelementationis could be applied in private communication, security system protection and any confidential data that is commonly used by government, military, industry and etc [5]. From that history, steganography is introduced as information hiding field that hides the confidential information to avoid the message from the third party [6].…”
Section: Introductionmentioning
confidence: 99%
“…Steganoraphy is the scientific knowledge information that hide the hidden message implementation in several media that are unrecognized by human vision [4]. The steganography impelementationis could be applied in private communication, security system protection and any confidential data that is commonly used by government, military, industry and etc [5]. From that history, steganography is introduced as information hiding field that hides the confidential information to avoid the message from the third party [6].…”
Section: Introductionmentioning
confidence: 99%