2012
DOI: 10.1016/j.jss.2012.05.027
|View full text |Cite
|
Sign up to set email alerts
|

A compression-based text steganography method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 54 publications
(45 citation statements)
references
References 13 publications
0
45
0
Order By: Relevance
“…Capacity ratio and complexity of the proposed method are improvements of the previous e-mail environment based text steganography methods [1][2][3][4] in terms of complexity. Reasonable capacity was obtained.…”
Section: Resultsmentioning
confidence: 86%
See 3 more Smart Citations
“…Capacity ratio and complexity of the proposed method are improvements of the previous e-mail environment based text steganography methods [1][2][3][4] in terms of complexity. Reasonable capacity was obtained.…”
Section: Resultsmentioning
confidence: 86%
“…In [1], [2], Satir and Isik used email to be the cover of the secret data. Sending same e-mail to many recipients were the key idea of their studies.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Security (detect ability), robustness and secrecy (difficulty of extraction) [12] are most obvious measures according to the function of steganography. The most popular qualified measure is hiding capacity [7] [12]. Capacity is also the measurement for robustness and limited by security [12].…”
Section: Steganography Methods and Evaluationmentioning
confidence: 99%