2013
DOI: 10.1007/s13369-013-0574-5
|View full text |Cite
|
Sign up to set email alerts
|

Secure Digital Steganography for ASCII Text Documents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…In current literature, algorithms can either target the PDF format directly, or exploit a form of ASCII steganography, which can then be converted from one texttype format to another. Rafat & Sher (Rafat and Sher, 2013)p r opose an ASCII based steganographic algorithm robust enough to allow conversion between MS Word and PDF files without losing any of the embedded content.…”
Section: Related Workmentioning
confidence: 99%
“…In current literature, algorithms can either target the PDF format directly, or exploit a form of ASCII steganography, which can then be converted from one texttype format to another. Rafat & Sher (Rafat and Sher, 2013)p r opose an ASCII based steganographic algorithm robust enough to allow conversion between MS Word and PDF files without losing any of the embedded content.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, demand is growing for intelligence and multimedia security studies that involve not only encryption, but also covert communication whose essence lies in concealing data [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 ]. Recently, information hiding or data hiding in digital texts, known as text hiding, has drawn considerable attention due to its extensive usage, and potential applications in the cybersecurity and network communication industries [ 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 5...…”
Section: Introductionmentioning
confidence: 99%
“…The goal of watermarking is providing proof of ownership for the cover media against malicious attacks such as tampering, forgery, and plagiarism (e.g., the embedded watermark indicates the original owner). While, the aim of steganography is the invisible transmission of confidential information so that no one (except an intended recipient) can discover/encode it, i.e., steganography concerns concealing the fact that a medium contains secret data that is invisible/ indiscernible [ 1 , 3 , 41 ].…”
Section: Introductionmentioning
confidence: 99%
“…In other words, watermarking aims to protect intellectual property of digital media against unauthorized copy or access by embedding a watermark (visible or invisible) in the cove media which can remain beside the data, and it can be used whenever there is any query about the originality of media (e.g., the hidden watermark refers to the original owner) [2][3][4][5][6][7][8][9][10]. Over the last two decades, many information hiding techniques have been proposed in terms of text watermarking and text steganography for copyright protection [11][12][13][14], proof of ownership [15][16][17][18][19][20][21][22][23], and copy control and authentication [24][25][26][27][28][29][30][31]. Although the aim of steganography is different, it also can be used for the copyright protection of digital texts like watermarking.…”
Section: Introductionmentioning
confidence: 99%