Proceedings of the International Conference on Advances in Information Communication Technology &Amp; Computing - AICTC '16 2016
DOI: 10.1145/2979779.2979786
|View full text |Cite
|
Sign up to set email alerts
|

Text Steganography Based on Feature Coding Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…e newly proposed combined algorithms of onetime cryptography and text steganography missing letter puzzles and hiding data in the word list use ASCII value, and the randomly generated cover text is exposed to structural attacks. By contrast, the paragraph hiding method in [8] is more secure due to using a naturallooking cover text compared to the randomly generated cover text but needs additional security in text stenography such as text steganography based on the feature coding method [10] that secure hiding data from visual attacks and structural attack. erefore, the DSTS [9] algorithm has included CASE as a third security layer.…”
Section: Random and Statistical Productionmentioning
confidence: 99%
See 1 more Smart Citation
“…e newly proposed combined algorithms of onetime cryptography and text steganography missing letter puzzles and hiding data in the word list use ASCII value, and the randomly generated cover text is exposed to structural attacks. By contrast, the paragraph hiding method in [8] is more secure due to using a naturallooking cover text compared to the randomly generated cover text but needs additional security in text stenography such as text steganography based on the feature coding method [10] that secure hiding data from visual attacks and structural attack. erefore, the DSTS [9] algorithm has included CASE as a third security layer.…”
Section: Random and Statistical Productionmentioning
confidence: 99%
“…e more secure algorithm is the paragraph hiding method [8], which uses a natural-looking cover text, i.e., it takes a cover text from any book or newspaper; but still, a more secure text steganographic method than the current approach is needed. Consequently, a double-secure algorithm for text steganography [9] is the safe method due to combining the best features of the paragraph hiding method with text steganography based on the feature coding method [10], even though it downgrades the current paragraph hiding approach's average hiding capacity from 2.06% to 1%. e enhancement in the capacity of the double-secure algorithm for text steganography has improved the average hiding capacity with MDSTS from 1% to 3.98% with UTF-16 and 6.49% with UTF-8.…”
Section: Introductionmentioning
confidence: 99%
“…[9]. The characters for the secret message is converted to its binary, then it will replaced by the ASCII characters [10]. two-letter word: regarding to the location of two letters, the secret message will be embedded [11].…”
Section: Feature-based Techniquementioning
confidence: 99%
“…High security [9]. Robust and High capacity because of hiding Eight bits in one character [10]. High capacity and robust [11].…”
Section: Feature-based Techniquementioning
confidence: 99%
“…Others hide messages by changing the character scale and color or adding underline styles in a document [Panda et al 2015;Stojanov et al 2014], although those changes are generally noticeable. More recent methods exploit special ASCII codes and Unicodes that are displayed as an empty space in a PDF viewer [Chaudhary et al 2016;Rizzo et al 2016].…”
Section: Related Workmentioning
confidence: 99%