2018
DOI: 10.1007/978-981-10-8639-7_19
|View full text |Cite
|
Sign up to set email alerts
|

A Semantic Approach to Text Steganography in Sanskrit Using Numerical Encoding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Some researchers have not stated invisibility as the essential criterion of steganography evaluation [56]. On the other hand, most researchers have highlighted invisibility as one of the most critical goals to protect the hidden message [5,7,[80][81][82][83][84][85][86][87][88]. We believe that invisibility is one of the most critical features for preventing the attacker from detecting the hidden message then extracting it.…”
Section: Invisibilitymentioning
confidence: 99%
“…Some researchers have not stated invisibility as the essential criterion of steganography evaluation [56]. On the other hand, most researchers have highlighted invisibility as one of the most critical goals to protect the hidden message [5,7,[80][81][82][83][84][85][86][87][88]. We believe that invisibility is one of the most critical features for preventing the attacker from detecting the hidden message then extracting it.…”
Section: Invisibilitymentioning
confidence: 99%
“…Security comparison: To measure the security, data must be protected from the unauthorized access if it is transmitted or stored (Vaishakh et al, 2019). An eavesdropper is not able for the detection of hidden text and can be called a security breach (Gutub & Ghamdi, 2019).…”
Section: Figure 6 Capacity Comparisons Of Wm Approachesmentioning
confidence: 99%
“…Steganography is the art and science of secret communication to conceals sensitive information from an intermediary [4,27]. In addition, in the steganography, the secret message is embedded inside of several cover media, such as text [16,19,31,41], image [21,25,32,51], video [2,12,28] and audio [30,48] files. There are two main criteria by which the performance of steganographic algorithms can be measured, embedding capacity and detectability.…”
Section: Introductionmentioning
confidence: 99%