2021
DOI: 10.3390/math9212829
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Text Steganography Techniques

Abstract: There has been a persistent requirement for safeguarding documents and the data they contain, either in printed or electronic form. This is because the fabrication and faking of documents is prevalent globally, resulting in significant losses for individuals, societies, and industrial sectors, in addition to national security. Therefore, individuals are concerned about protecting their work and avoiding these unlawful actions. Different techniques, such as steganography, cryptography, and coding, have been dep… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(22 citation statements)
references
References 76 publications
0
22
0
Order By: Relevance
“…The hiding capacity is a major crucial parameter for analysis of the text steganography algorithm performance. We used the Jaro-Winkler distance, as used in [20], which is a similarity metric for the cover text and stego cover (1) and (2). The similarity metrics were used to calculate how similar two strings were to one another, with (0) indicating a difference and (1) indicating equal matching or imperceptibility of strings.…”
Section: Experimental and Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…The hiding capacity is a major crucial parameter for analysis of the text steganography algorithm performance. We used the Jaro-Winkler distance, as used in [20], which is a similarity metric for the cover text and stego cover (1) and (2). The similarity metrics were used to calculate how similar two strings were to one another, with (0) indicating a difference and (1) indicating equal matching or imperceptibility of strings.…”
Section: Experimental and Analysismentioning
confidence: 99%
“…Although they have the same goal, steganography and cryptography use different techniques. Steganography, as compared to cryptography, keeps the original data by concealing it in various medium [2] [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Data communication over the Internet has increased significantly, resulting in high traffic and concerns about the security of transmitted data (Jan, Parah, Hussan, & Malik, 2022;Mahato, Khan, & Yadav, 2017). Moreover, information transmitted over the Internet always catches the attention of intruders, which causes the security of sensitive data (Majeed & Sulaiman, 2021;Maniriho & Ahmad, 2017), and it is a severe problem and needs to be preserved to prevent leakage (Bhat, Prabhu, & Renuka, 2017;Jan et al, 2022;Joseph & Vishnukumar, 2015). Therefore, it is necessary to protect sensitive data so irresponsible parties cannot access it (Pujari & Shinde, 2016).…”
Section: Introductionmentioning
confidence: 99%
“…The science of concealing and transferring hidden information is known as steganography [1], [2]. It is a set of techniques for concealing information through the use of multimedia data, such as image, text, audio, video, and network [3]- [5]. Beacuse people utilization of images since they are one of the most widely used media, Image steganography has attracted a lot of interest, steganographic communication has a significant technology in the field of information security today [6], [7].…”
Section: Introductionmentioning
confidence: 99%