2011
DOI: 10.1504/ijsn.2011.043653
|View full text |Cite
|
Sign up to set email alerts
|

Edustega: an Education-Centric Steganography methodology

Abstract: This paper presents a novel Education-Centric Steganography Methodology (Edustega) that takes advantages of such text to conceal data. Edustega is based on Nostega paradigm, which implies that it neither hides data in a noise (errors) nor produces noise. Such materials, e.g., questions, answers, exams, examples, puzzles, competitions, etc., have an adequate room for concealing data where the observed bitrate by the experimental results of the current implementation is superior to all contemporary linguistic st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 44 publications
0
2
0
Order By: Relevance
“…Some threats and attacks have been undertaken properly, while others are still remaining to be solved. These aspects are also related security and privacy in systems other than cloud computing [99], [100], [101], [102], [103], [104], [105], [106], [107], [108], [109], [110], [111], [112], [113], [114], [115], [116], [117], [118], [119], [120], [121], [122], [123].…”
Section: Attribute-driven Methodologymentioning
confidence: 99%
“…Some threats and attacks have been undertaken properly, while others are still remaining to be solved. These aspects are also related security and privacy in systems other than cloud computing [99], [100], [101], [102], [103], [104], [105], [106], [107], [108], [109], [110], [111], [112], [113], [114], [115], [116], [117], [118], [119], [120], [121], [122], [123].…”
Section: Attribute-driven Methodologymentioning
confidence: 99%
“…With the advent of these systems, security has become a critical concern. The major issues of security are integrity, confidentiality, availability, authenticity, authorization, noninterference, accountability [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17], and so on. Today's systems ask users to offer information for verifying their identities with the aim of preventing attacks on the systems by allowing only authorized users to access the computers.…”
Section: Introductionmentioning
confidence: 99%