2012
DOI: 10.7763/ijet.2012.v4.480
|View full text |Cite
|
Sign up to set email alerts
|

Steg Rithm: Steganographic Algorithm for Digital ASCII Text Documents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…There are various type of extraction performance criteria frequently used in data hiding. Security [9], [11]- [19] S Imperceptibility [11], [20] IM Capacity [11]- [13][21]- [23] C Robust [9], [19], [24] R Efficiency [16], [18], [25] E Invisibility [26] IN Accuracy [27], [28] AC Speed [15] SP Complexity [21] CP Reversibility [25], [29] RV Realitibility RL Integrity [24], [30] IG Perceptibility [11] PC Assumption [24] AS Confidentiality [31] CF Availability [32] V…”
Section: Review Criteriamentioning
confidence: 99%
See 1 more Smart Citation
“…There are various type of extraction performance criteria frequently used in data hiding. Security [9], [11]- [19] S Imperceptibility [11], [20] IM Capacity [11]- [13][21]- [23] C Robust [9], [19], [24] R Efficiency [16], [18], [25] E Invisibility [26] IN Accuracy [27], [28] AC Speed [15] SP Complexity [21] CP Reversibility [25], [29] RV Realitibility RL Integrity [24], [30] IG Perceptibility [11] PC Assumption [24] AS Confidentiality [31] CF Availability [32] V…”
Section: Review Criteriamentioning
confidence: 99%
“…Following capacity is robustness (R) with 14% contributions in the literature. Robustness concerns on modifying the stego object but not affecting the embedded information [24]. A study by [34] stated that in cryptography technique the robustness is the parameter to measuring the secrecy of data transmission, while security is measured the way silent of communicate data.…”
Section: Preferred Extraction Performance Metricsmentioning
confidence: 99%
“…The most novel approach to arrest the security challenges in the cloud used by researchers is cryptography and steganography [2]. The both mentioned techniques are used to protect data but in different fashions [6]. Cryptography concerns itself with the masking of the content of a secret message whereas steganography deals with the concealment or hiding of a secret message from an unauthorized person [7].…”
Section: Introductionmentioning
confidence: 99%