2018
DOI: 10.1007/978-3-319-99007-1_49
|View full text |Cite
|
Sign up to set email alerts
|

Enhancement of Text Steganography Technique Using Lempel-Ziv-Welch Algorithm and Two-Letter Word Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(31 citation statements)
references
References 10 publications
0
29
0
Order By: Relevance
“…Apart from whitespaces, the Unicode standard also provides some totally invisible symbols, which are provided as zero-width whitespaces. These symbols, together with whitespaces, have been exploited to watermark HTML pages [48,49] and more generally to hide hidden messages in the text [50].…”
Section: Structural Methodsmentioning
confidence: 99%
“…Apart from whitespaces, the Unicode standard also provides some totally invisible symbols, which are provided as zero-width whitespaces. These symbols, together with whitespaces, have been exploited to watermark HTML pages [48,49] and more generally to hide hidden messages in the text [50].…”
Section: Structural Methodsmentioning
confidence: 99%
“…Venkatraman et al [37] noted that robustness is essential when responding to malevolent and unwanted attacks. Figure 4 depicts the main requisites for a steganography setup [38]. The following segment comprehensively elucidates the discussed attributes.…”
Section: Attributes Of Steganographymentioning
confidence: 99%
“…In the Unicode, there are special zero-width characters (ZWC) which are employed to provide specific entities such as Zero Width Joiner (ZWJ), e.g., ZWJ joins two supportable characters together in particular languages, POP directional, and Zero Width Non-Joiner (ZWNJ), etc. Practically, the ZWC characters do not have traces, widths or written symbol in digital texts [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 11 , 15 , 18 , 25 , 26 , 27 , 28 , 33 , 34 , 41 , 42 , 43 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 ,…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore, demand is growing for intelligence and multimedia security studies that involve not only encryption, but also covert communication whose essence lies in concealing data [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 ]. Recently, information hiding or data hiding in digital texts, known as text hiding, has drawn considerable attention due to its extensive usage, and potential applications in the cybersecurity and network communication industries [ 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 5...…”
Section: Introductionmentioning
confidence: 99%