2021
DOI: 10.11591/eei.v10i1.2518
|View full text |Cite
|
Sign up to set email alerts
|

Traid-bit embedding process on Arabic text steganography method

Abstract: The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Moreover, the experimental results have been compared with the existing works regarding capacity and invisibility. The secret message and cover text dataset in this study have been utilized in previous studies [8,16,17,71,74,97,98]. The selected secret message has 198 characters, and the cover text has 874 characters [18], as presented in Table 6.…”
Section: Experimental Results and Comparisonsmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, the experimental results have been compared with the existing works regarding capacity and invisibility. The secret message and cover text dataset in this study have been utilized in previous studies [8,16,17,71,74,97,98]. The selected secret message has 198 characters, and the cover text has 874 characters [18], as presented in Table 6.…”
Section: Experimental Results and Comparisonsmentioning
confidence: 99%
“…This can be measured by computing the number of used characters in the cover text. The following formula is used to calculate the usage ratio [10,[74][75][76]:…”
Section: B Bit Per Locationsmentioning
confidence: 99%
“…Therefore, most steganographic techniques related to audios and images are implemented to video too. Steganography in the video is similar to steganography in the images apart from data is hidden in each frame of the video [1], [18], [47], [48], [54]- [57], [65]- [68], [20], [69]- [77], [22], [23], [33], [34], [43]- [45]. The main advantages of embedding information in a video are the huge amount of information that are hidden inside the covers [4], [11], [17], [22], [40], [45], [48], [51], [57], [78], [79].…”
Section: Related Workmentioning
confidence: 99%
“…The size of the information does not issue in video steganography because it is embedded inside multiple frames. Although video steganography bear the large size of the message [1], [18], [48], [54]- [57], [65]- [69], [20], [70]- [77], [22], [23], [33], [34], [44], [45], [47]. But it is necessary the algorithm selects the best bits to embed the information on it [11], [23], [47], [59], [69], [76], [80], [81].…”
Section: Related Workmentioning
confidence: 99%
“…In text steganography, the structure and language characteristics of texts are used to hide secret information. English script is mostly utilized compared to Arabic script in text hiding [14].…”
Section: Introductionmentioning
confidence: 99%