2013
DOI: 10.5815/ijcnis.2014.01.08
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach of Text Steganography using Nonlinear Character Positions (NCP)

Abstract: Usually, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders and to protect the data from the prying eyes. This paper presents a survey of text steganography method used for hiding secret information inside some cover text. Here the text steganography algorithms based on modification of font format, font style et cetera, has advantages of great capacity, good imperceptibility and wide application range. The n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Moreover, text steganography is one of the oldest information hiding techniques, which is considered as the hardest cover media to use for steganography purpose due to less redundant information available inside the text files for hiding the data [7,8,10,11,[14][15][16]. Therefore, several researchers have developed some text techniques over the past decade, which can be categorized under three approaches, namely format-based, random and statistical generation and linguistic [11,15,17,18], as fig, 2 shows. In fact, each text steganography approach manipulates the cover text (text file) in a different way to hide the secret message.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, text steganography is one of the oldest information hiding techniques, which is considered as the hardest cover media to use for steganography purpose due to less redundant information available inside the text files for hiding the data [7,8,10,11,[14][15][16]. Therefore, several researchers have developed some text techniques over the past decade, which can be categorized under three approaches, namely format-based, random and statistical generation and linguistic [11,15,17,18], as fig, 2 shows. In fact, each text steganography approach manipulates the cover text (text file) in a different way to hide the secret message.…”
Section: Related Workmentioning
confidence: 99%
“…There are many algorithms and methods to accomplish data steganography [6][7][8][9] and cryptography [10][11][12]. And to combine them in one system, it requires selecting the best method from each one of them to suit and verify the intended needs of the applications.…”
Section: Introductionmentioning
confidence: 99%