2018
DOI: 10.1007/978-3-319-76687-4_15
|View full text |Cite
|
Sign up to set email alerts
|

Data Hiding on Social Media Communications Using Text Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…In the Unicode, there are special zero-width characters (ZWC) which are employed to provide specific entities such as Zero Width Joiner (ZWJ), e.g., ZWJ joins two supportable characters together in particular languages, POP directional, and Zero Width Non-Joiner (ZWNJ), etc. Practically, the ZWC characters do not have traces, widths or written symbol in digital texts [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 11 , 15 , 18 , 25 , 26 , 27 , 28 , 33 , 34 , 41 , 42 , 43 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 ,…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…In the Unicode, there are special zero-width characters (ZWC) which are employed to provide specific entities such as Zero Width Joiner (ZWJ), e.g., ZWJ joins two supportable characters together in particular languages, POP directional, and Zero Width Non-Joiner (ZWNJ), etc. Practically, the ZWC characters do not have traces, widths or written symbol in digital texts [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 11 , 15 , 18 , 25 , 26 , 27 , 28 , 33 , 34 , 41 , 42 , 43 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 ,…”
Section: Literature Reviewmentioning
confidence: 99%
“…Large media companies are not expected to go away overnight, nor will the demand to communicate by smartphone or meet people in person, but social media provides one more means of engaging with users on this enormous planet, and if employed effectively could give all a more desirable option in how to live and communicate to each other in the digital world. Since the text message in the form of SMS, chat, email, and so on, has become a popular and easy form of communication, concerns about data leakage attacks, such as hacking, hijacking, and phishing, have emerged [ 1 , 6 , 8 , 11 ]. Table 2 lists the text character limitation of social media and messenger apps which support the Unicode standard to process digital texts in different languages (except for ‘Twitter’ and ‘Telegram’).…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…In [101], authors have first encrypted the secret message using 'Data Encryption Standard' (DES) algorithm. Here the cover is dynamically generated from the Hexadecimal character of encrypted message using a predefined look up table substitution.…”
Section: Figure 1 Grey Level Representation In Histogram Of An Imagementioning
confidence: 99%