4 research outputs found

    Analysis Review on Performance Metrics for Extraction Schemes in Text Steganography

    Get PDF
    In today's era of big data computer networks, protection of secret messages when transmitting information is a major concern.The openness and publicity of the communication channel are the main attraction for malicious people to steal personal data even though privacy protection in operational.Data extraction is process that reverses the data embedding process in information hiding. However, the performance of an information hiding framework highly depends on the evaluation metrics used.The effectiveness of evaluation itself is mainly determined by the performance aspect or critera such as capacity, imperceptibility or security.The aim of this paper is to present a review on trends for existing performance metrics used in extraction schemes from a data hiding framework.This review is hoped to help future research in evaluating the performance of data hiding framework in general and the proposed extraction schemes in specific

    A Comparative Review on Data Hiding Schemes

    Get PDF
    Data hiding is a technique used to protect confidential information.The aim of a particular data hiding scheme is to make a more secure and robust method of information exchange so that confidential and private data can be protected against attacks and illegal access. The aim of this paper is to review on different data hiding schemes, covering the decoding, decrypting and extracting schemes.This paper also highlighted three major schemes that are widely used in research and real practice.The discussion include findings on the most recent work on decryption schemes

    Performance analysis on secured data method in natural language steganography

    Get PDF
    The rapid amount of exchange information that causes the expansion of the internet during the last decade has motivated that a research in this field.  Recently, steganography approaches have received an unexpected attention. Hence, the aim of this paper is to review different performance metric; covering the decoding, decrypting and extracting performance metric. The process of data decoding interprets the received hidden message into a code word. As such, data encryption is the best way to provide a secure communication. Decrypting take an encrypted text and converting it back into an original text. Data extracting is a process which is the reverse of the data embedding process. The effectiveness evaluation is mainly determined by the performance metric aspect. The intention of researchers is to improve performance metric characteristics. The evaluation success is mainly determined by the performance analysis aspect.  The objective of this paper is to present a review on the study of steganography in natural language based on the criteria of the performance analysis. The findings review will clarify the preferred performance metric aspects used. This review is hoped to help future research in evaluating the performance analysis of natural language in general and the proposed secured data revealed on natural language steganography in specific

    A Comparative Review on Data Hiding Schemes

    Get PDF
    Data hiding is a technique used to protect confidential information. The aim of a particular data hiding scheme is to make a more secure and robust method of information exchange so that confidential and private data can be protected against attacks and illegal access. The aim of this paper is to review on different data hiding schemes, covering the decoding, decrypting and extracting schemes. This paper also highlighted three major schemes that are widely used in research and real practice. The discussion include findings on the most recent work on decryption schemes
    corecore