2016
DOI: 10.21700/ijcis.2016.129
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Eight Proposed Security Methods using Linguistic Steganography Text

Abstract: This paper compares eight proposed methods using steganography of Arabic language texts for different search algorithms to consider a secret key. All methods use random numbers to generate the secret key. The objectives are to evaluate each method and to select the best method that provides the best solution suitable to hide the Arabic language texts. Secret sharing is the fourth-best method in security, linear regression is the best method for transparency and capacity of secret message hiding, whereas singul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…These methods depend on utilizing the probability feature of the given text as a secret watermark key. The ASCII-based method is suggested in [30] for copyright protection of English text. This method uses ASCII of non-vowel letters of the English text.…”
Section: Related Workmentioning
confidence: 99%
“…These methods depend on utilizing the probability feature of the given text as a secret watermark key. The ASCII-based method is suggested in [30] for copyright protection of English text. This method uses ASCII of non-vowel letters of the English text.…”
Section: Related Workmentioning
confidence: 99%
“…The approach provides security against popular text attacks with a watermark distortion rate if, for all known attacks, it is greater than one. For the defense of English text by copyright, based on the present rate of ASCII non-vowel letters and terms, the conventional watermark approach [30] has been suggested.…”
Section: Related Workmentioning
confidence: 99%
“…As a comparison of tampering based on attack types, the results show that the most sensitive tampering detection in all attack volume scenarios is the insertion attack. The accuracy of tampering detection is carefully analysed and compared between HFDATAI and baseline algorithms ZWAFWMM [5] and RACAAT [30].…”
Section: Hfdatai Simulation and Experiments Findingsmentioning
confidence: 99%