Proceedings of the 2014 Zone 1 Conference of the American Society for Engineering Education 2014
DOI: 10.1109/aseezone1.2014.6820635
|View full text |Cite
|
Sign up to set email alerts
|

Steganography in text by using MS word symbols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
16
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 10 publications
0
16
0
Order By: Relevance
“…The MS Word Symbols Algorithm hides data inside a Word file without altering the carrier file properties such as file size, content and format [14]. The MS Word Symbols Algorithm employs some non-printable symbols to hide four bits between letters.…”
Section: Steganography In Text By Using Ms Word Symbols (A8)mentioning
confidence: 99%
“…The MS Word Symbols Algorithm hides data inside a Word file without altering the carrier file properties such as file size, content and format [14]. The MS Word Symbols Algorithm employs some non-printable symbols to hide four bits between letters.…”
Section: Steganography In Text By Using Ms Word Symbols (A8)mentioning
confidence: 99%
“…Therefore, demand is growing for intelligence and multimedia security studies that involve not only encryption, but also covert communication whose essence lies in concealing data [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 ]. Recently, information hiding or data hiding in digital texts, known as text hiding, has drawn considerable attention due to its extensive usage, and potential applications in the cybersecurity and network communication industries [ 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 5...…”
Section: Introductionmentioning
confidence: 99%
“…Right remark, Left remark, Zero width joiner, and Zero width joiner [28] The algorithm used stego key and input carrier for created symbol table and binary representation for hidden bits to embed in the text…”
mentioning
confidence: 99%
“…Based on Table 2, it is showed the list of feature-based technique that analysed the performance in term of effectiveness and security: 1. In term of effectiveness performance feature-based techniques, the review of evaluation has some drawback such as it has problem in algorithm development [25], [36], [38], dependable with some requirement [6,28,30], and some technique only able to use in some environment [43,44] Those are evaluation it is possibly influencing the quality performance of effectiveness technique. 2.…”
mentioning
confidence: 99%