2018
DOI: 10.1166/asl.2018.12941
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the Feature-Based Technique of Text Steganography Based on Capacity and Time Processing Parameters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Moreover, the experimental results have been compared with the existing works regarding capacity and invisibility. The secret message and cover text dataset in this study have been utilized in previous studies [8,16,17,71,74,97,98]. The selected secret message has 198 characters, and the cover text has 874 characters [18], as presented in Table 6.…”
Section: Experimental Results and Comparisonsmentioning
confidence: 99%
“…Moreover, the experimental results have been compared with the existing works regarding capacity and invisibility. The secret message and cover text dataset in this study have been utilized in previous studies [8,16,17,71,74,97,98]. The selected secret message has 198 characters, and the cover text has 874 characters [18], as presented in Table 6.…”
Section: Experimental Results and Comparisonsmentioning
confidence: 99%
“…Meanwhile, the performance metrics such as confidentiality, availability, and integrity have the minimum percentage that used by researchers at 4%, 3% and 3% respectively. Embedding time [3,5,23,[26][27][28][29][30][31][32] Calculates the time of the technique that the embedding process consumes. Hiding capacity [3,6,11,17,18,20,22,25,27,30,[33][34][35][36][37][38][39][40][41][42][43] It is the maximum number of bits that could be embedded in the cover medium.…”
Section: Bulletin Of Electr Eng and Infmentioning
confidence: 99%
“…Thus, the carrier object after encryption is meaningless. Meanwhile, information hiding conceals the secret message to make it unnoticed/invisible in the course of its transmission via the public (untrusted) communication channel [3]. Invisibility is the fundamental difference between cryptography and information hiding [4].…”
Section: Introductionmentioning
confidence: 99%