2015
DOI: 10.1515/jok-2015-0019
|View full text |Cite
|
Sign up to set email alerts
|

Analysis Of Aspects Of Messages Hiding In Text Environments

Abstract: In the work are researched problems, which arise during hiding of messages in text environments, being transmitted by electronic communication channels and the Internet. The analysis of selection of places in text environment (TE), which can be replaced by word from the message is performed. Selection and replacement of words in the text environment is implemented basing on semantic analysis of text fragment, consisting of the inserted word, and its environment in TE. For implementation of such analysis is use… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Some researchers have not stated invisibility as the essential criterion of steganography evaluation [56]. On the other hand, most researchers have highlighted invisibility as one of the most critical goals to protect the hidden message [5,7,[80][81][82][83][84][85][86][87][88]. We believe that invisibility is one of the most critical features for preventing the attacker from detecting the hidden message then extracting it.…”
Section: Invisibilitymentioning
confidence: 99%
“…Some researchers have not stated invisibility as the essential criterion of steganography evaluation [56]. On the other hand, most researchers have highlighted invisibility as one of the most critical goals to protect the hidden message [5,7,[80][81][82][83][84][85][86][87][88]. We believe that invisibility is one of the most critical features for preventing the attacker from detecting the hidden message then extracting it.…”
Section: Invisibilitymentioning
confidence: 99%
“…However, most other researchers have emphasized imperceptibility as one of the primary goals to protect the hidden message [17,43,56,[121][122][123][124][125][126] ("protection by invisibility"). We are inclined to take the latter perspective-invisibility is the key properties to prevent the attacker from detecting and hence deducting the hidden message [127][128][129][130].…”
Section: Invisibilitymentioning
confidence: 99%