4,276 research outputs found

    Substitution-based approach for linguistic steganography using antonym

    Get PDF
    Steganography has been a part of information technology security since a long time ago. The study of steganography is getting attention from researchers because it helps to strengthen the security in protecting content message during this era of Information Technology. In this study, the use of substitution-based approach for linguistic steganography using antonym is proposed where it is expected to be an alternative to the existing substitution approach that using synonym. This approach still hides the message as existing approach but its will change the semantic of the stego text from cover text. A tool has been developed to test the proposed approach and it has been verified and validated. This proposed approach has been verified based on its character length stego text towards the cover text, bit size types of the secret text towards the stego text and bit size types of the cover text towards the stego text. It has also been validated using four parameters, which are precision, recall, f-measure, and accuracy. All the results showed that the proposed approach was very effective and comparable to the existing synonym-based substitution approach

    Text Based Steganography

    Get PDF

    Evaluation Review on Effectiveness and Security Performances of Text Steganography Technique

    Get PDF
    Steganography is one of the categories in information hiding that is implemented to conceal the hidden message to ensure it cannot be recognized by human vision. This paper focuses on steganography implementation in text domain namely text steganography.Text steganography consists of two groups, which are word-rule based and feature-based techniques.This paper analysed these two categories of text steganography based on effectiveness and security evaluation because the effectiveness is critically important in order to determine that technique has the appropriate quality.Meanwhile, the security is important due to the intensity performance in securing the hidden message. The main goal of this paper is to review the evaluation of text steganography in terms of effectiveness and security that have been developed by previous research efforts. It is anticipated that this paper will identify the performance of text steganography based on effectiveness and security measurement

    The evaluation performance of letter-based techniques on text steganography method

    Get PDF
    The implementation of steganography as information hiding in research area is able in covering hidden message in text, image, audio and video. This paper focuses on the implementation of development steganography in text domain named text steganography. Mostly, the researcher utilize the text steganography technique named feature-based technique that covers a hidden message based on the uniqueness of letters. One of the technique in feature-based is letter-based technique that is able to hide the hidden message in a language that uses A-Z letters. This paper focuses on the three techniques of letter-based text steganography that have a similar implementation process in covering the hidden message. The three techniques are evaluated using some parameters to obtain the size bit ratio, loading time and validation performance. This parameter used in order to notice that the process of covering the hidden message could be influence capacity of text, the length of time consuming and determine the quality performance in term of validation approach

    Design of evaluation procedures for letter-based techniques in text ste ganography method

    Get PDF
    Steganography is one of information hiding area that covers the information in any medium domain such as text, image, audio and video. One of steganography categories in the medium of text is called text steganography. It conceals hidden message with embedding the text via various methods such as horizontally shifting, vertically shifting or based on the letter of text structures. Many researchers utilize the feature-based technique to cover hidden message based on uniqueness of letter. Therefore, this study intends to focus on specific type of feature-based technique which is the letter-based text steganography. However, there is still issue relating to this method which the existence of the technique in the text is easily discoverable by attackers. Literature indicated that this issue is probably rooted from the lack of verification and validation procedures during the development of the steganography method. This study aims to identify the suitable parameters for verification and validation process. In addition, the parameters will then be used in conducting evaluation on the letter-based text steganography. The outcome of this study showed that the parameters which involved in verification and validation process will be able to improve the performance and security of the technique

    Steganographically Encoded Data

    Get PDF
    Steganography is the art of hiding information in ways that prevent its detection. Though steganography is an ancient craft, the onset of computer technology has given it new life. Computer-based steganographic techniques introduce changes to digital covers to embed information foreign to the native covers. Such information may be communicated in the form of text, binary files, or provide additional information about the cover and its owner such as digital watermarks or fingerprints. This paper explains steganography, provides a brief history and describes how steganography is applied in hiding information in images.Steganography, information hiding, digital image, digital watermarking

    The evaluation performance of letter-based technique on text steganography system

    Get PDF
    Steganography is a part of information hiding in covering the hidden message in any medium such as text, image, audio, video and others. This paper concerns about the implementation of steganography in text domain called text steganography. It intends to concentrate on letter-based technique as one of the representative techniques in text steganography. This paper displays some techniques of letter-based that is integrated in one system technique displayeed in a logical and physical design. The integrated system is evaluated using some parameter that is used in order to discover the performance in term of capacity after embedding process and the time consuming in the development process. This paper is anticipated to contribute in describing the implementation of the techniques in one system and to display the performance some parameter evaluation

    Review of Linguistic Text Steganographic Methods

    Get PDF
    Steganography is a method of concealing confidential data in a cover file such that attacker cannot predict about clandestine data. Steganography exploit cover message, for example content, picture, sound, video record and so forth to conceal a mystery or secret message. Text Steganography is one of a procedure to conceal the one kind (text) of content data inside same type of content messages. Linguistic steganography is the language based steganographic scheme which proposes more advanced methods to hide the secret messages in text. Initially linguistic text steganographic techniques are developed only for the English language. But now days different regional languages are also used to hide the information like Hindi. This paper reviews the different linguistic text steganographic methods of hindi and English language
    • …
    corecore