2016 International Computer Symposium (ICS) 2016
DOI: 10.1109/ics.2016.0052
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Text Steganography Based on Search in Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…Steganography roots are linked with ancient Greece; however, currently, it is looked in for security reasons. Steganography is a division of data hiding techniques in a cover file like text [4, 5], image [6, 7], audio [8, 9] and/or video [10, 11]. Steganographic methods embed a secret message into a cover file before transmission.…”
Section: Introductionmentioning
confidence: 99%
“…Steganography roots are linked with ancient Greece; however, currently, it is looked in for security reasons. Steganography is a division of data hiding techniques in a cover file like text [4, 5], image [6, 7], audio [8, 9] and/or video [10, 11]. Steganographic methods embed a secret message into a cover file before transmission.…”
Section: Introductionmentioning
confidence: 99%
“…The embedding capacities of the existing methods by search are generally low. For example, the methods introduced in [21], [26] can only hide one or a few Chinese characters in a text because a high concealment is required. But the proposed methods only employ the PCCSN feature, and the texts containing the meaning of a secret are excluded, so these methods do have no impact on the concealment when the embedding capacity are improved, e.g.…”
Section: B Analysis Of the Embedding Capacitymentioning
confidence: 99%
“…Text steganography by search is a relatively new approach, which finds one or more appropriate texts as the carriers in the big data environment [21], [26]. It differs from text steganography by cover modification because no alternation will be performed on a text.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…These methods improved HC to some extends, but the SR will be gradually decrease as the length of the SI increases. Reference [20] introduced an algorithm based on web text big data, which simplifies the processing of text big data, but the location information is easy to be discovered due to the direct encoding.…”
Section: Introductionmentioning
confidence: 99%