2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT) 2013
DOI: 10.1109/acct.2013.19
|View full text |Cite
|
Sign up to set email alerts
|

A Modified Approach to Text Steganography Using HyperText Markup Language

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Moreover, the calculation performance in developing technique of feature-based method displays in Figure 3. Rules [48] It has effective algorithm 11 Binary Mapping [34] Easy to detect changes letter 12 HTML Web page steganography [33] 13 Font color MS excel [12] Easy to detect changes letter 14 Character pair text [49] Easy to detect changes letter 15 AITSteg Via social media [50] 16 Multilayer Partially Homomorphic [51] 18 English text using number oriented [52] Fast embedding process 19 Huffman Compression [53] 20 Content-based Feature extraction [54] 21 Alphabet Pairing Text [55] 22 Compression ratio in Email [36] Complex algorithm 23 Encryption with Cover Text and Reordering [37] 24 Back-end interface web page [56] Time consuming process : High performance : Lack performance : No performance Figure 3 shows the number of achievements in development feature-based method in last decade. Based on Fig.…”
Section: Fig 2 the Relation Performances In Development Steganography...mentioning
confidence: 99%
“…Moreover, the calculation performance in developing technique of feature-based method displays in Figure 3. Rules [48] It has effective algorithm 11 Binary Mapping [34] Easy to detect changes letter 12 HTML Web page steganography [33] 13 Font color MS excel [12] Easy to detect changes letter 14 Character pair text [49] Easy to detect changes letter 15 AITSteg Via social media [50] 16 Multilayer Partially Homomorphic [51] 18 English text using number oriented [52] Fast embedding process 19 Huffman Compression [53] 20 Content-based Feature extraction [54] 21 Alphabet Pairing Text [55] 22 Compression ratio in Email [36] Complex algorithm 23 Encryption with Cover Text and Reordering [37] 24 Back-end interface web page [56] Time consuming process : High performance : Lack performance : No performance Figure 3 shows the number of achievements in development feature-based method in last decade. Based on Fig.…”
Section: Fig 2 the Relation Performances In Development Steganography...mentioning
confidence: 99%
“…For example, the letter-based method uses the alphabets A to Z, which can be adopted in many languages. The authors of [37,[48][49][50] have studied the feature-based method, which can be operated in any language, either with figures or alphabets. Examples of feature-based embedded methods applied in several languages are reviewed below.…”
Section: Linguistic Steganographymentioning
confidence: 99%
“…This technique can only develop in e-mail environment Encryption with Cover Text and Reordering (ECR) [36] Based on characteristic letter and inter-Word in the text Large capacity embedding; has quick time to embed process It has complex requirement in embedding and process of technique Chain code using ANOVA [37] Based on chain-code histogram in Bangla text It is possible for the letters to embed the hidden message Low security in covering the hidden message Back end interface web page [38] Based on characteristic HTML in Web page…”
Section: Large Capacity For Embedding the Hidden Messagementioning
confidence: 99%