2019
DOI: 10.22266/ijies2019.0630.20
|View full text |Cite
|
Sign up to set email alerts
|

A High Capacity PDF Text Steganography Technique Based on Hashing Using Quadratic Probing

Abstract: In this paper, a novel approach of PDF-based text steganography is presented. A covert communication is achieved by embedding secret information at between-characters positions of words within cover PDF text. A stegoencoding technique is being designed to improve the embedding capacity along with sufficiently reduced overheads of stego-cover PDF file. The proposed method constructs multilevel embedding capacities which can be used according to requirements from higher embedding capacity to typical embedding ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…Meanwhile, the performance metrics such as confidentiality, availability, and integrity have the minimum percentage that used by researchers at 4%, 3% and 3% respectively. Embedding time [3,5,23,[26][27][28][29][30][31][32] Calculates the time of the technique that the embedding process consumes. Hiding capacity [3,6,11,17,18,20,22,25,27,30,[33][34][35][36][37][38][39][40][41][42][43] It is the maximum number of bits that could be embedded in the cover medium.…”
Section: Bulletin Of Electr Eng and Infmentioning
confidence: 99%
“…Meanwhile, the performance metrics such as confidentiality, availability, and integrity have the minimum percentage that used by researchers at 4%, 3% and 3% respectively. Embedding time [3,5,23,[26][27][28][29][30][31][32] Calculates the time of the technique that the embedding process consumes. Hiding capacity [3,6,11,17,18,20,22,25,27,30,[33][34][35][36][37][38][39][40][41][42][43] It is the maximum number of bits that could be embedded in the cover medium.…”
Section: Bulletin Of Electr Eng and Infmentioning
confidence: 99%
“…In [7], the author presented LZW compression-based text steganography with email-ids and email texts as career medium of secret data. In [8], text steganography presented by combining the move-tofront, burrows-wheeler-transform and LZW compression methods to obtain improved compression of secret text whereas the cover medium is similar to [7]. In [9], an extension of text steganography [8] is presented in order to improve embedding capacity by the application of the Huffman algorithm.…”
Section: Crossreferen Ce Tablementioning
confidence: 99%
“…In [8], text steganography presented by combining the move-tofront, burrows-wheeler-transform and LZW compression methods to obtain improved compression of secret text whereas the cover medium is similar to [7]. In [9], an extension of text steganography [8] is presented in order to improve embedding capacity by the application of the Huffman algorithm. In [7][8][9] schemes cover text chosen is not natural text that utilizing the set of email-ids as a cover medium may create susceptibility which may be noticeable as unnatural by the human observer and can be tempered.…”
Section: Crossreferen Ce Tablementioning
confidence: 99%
See 1 more Smart Citation
“…The three basic ideas behind robust steganography are embedding capacity, invisibility and imperceptibility. There is a tradeoff among these features to obtain high-quality steganography [3][4][5][6].…”
Section: A Introduction Of Steganographymentioning
confidence: 99%