2018
DOI: 10.11591/ijeecs.v11.i2.pp747-754
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation Review on Effectiveness and Security Performances of Text Steganography Technique

Abstract: Steganography is one of the categories in information hiding that is implemented to conceal the hidden message to ensure it cannot be recognized by human vision. This paper focuses on steganography implementation in text domain namely text steganography. Text steganography consists of two groups, which are word-rule based and feature-based techniques. This paper analysed these two categories of text steganography based on effectiveness and security evaluation because the effectiveness is critically important i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…We compared two RNN, RNN-Stega [10] and RNNgenerated Lyrics, in this study. The two methods were contrasted in terms of the language used, the form of training data set, the amount of training data, the methods, the coding system, embedding rate and capability, security, and other factors.…”
Section: Comparison Of Two Rnn Steganography Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We compared two RNN, RNN-Stega [10] and RNNgenerated Lyrics, in this study. The two methods were contrasted in terms of the language used, the form of training data set, the amount of training data, the methods, the coding system, embedding rate and capability, security, and other factors.…”
Section: Comparison Of Two Rnn Steganography Methodsmentioning
confidence: 99%
“…The approach, on the other hand, is useless for overall security since it only analyses the statistical features of a single phrase, neglecting the broader distribution of batch-generated texts. Din et al [10] writes that the majority of Machine Translation systems used today is statistical MT particularly reliant on templates drawn from a corpus, as opposed to transfer systems based on linguistic principles. To construct a translation model in statistical MT, the algorithm is trained using a linguistic concurrent dataset.…”
Section: Contributionmentioning
confidence: 99%
“…Meanwhile, the performance metrics such as confidentiality, availability, and integrity have the minimum percentage that used by researchers at 4%, 3% and 3% respectively. Embedding time [3,5,23,[26][27][28][29][30][31][32] Calculates the time of the technique that the embedding process consumes. Hiding capacity [3,6,11,17,18,20,22,25,27,30,[33][34][35][36][37][38][39][40][41][42][43] It is the maximum number of bits that could be embedded in the cover medium.…”
Section: Bulletin Of Electr Eng and Infmentioning
confidence: 99%
“…Confidentiality [27,34,45] It is a measurement to ensure that the secret data will not be available to unauthorized people. Integrity [31,34] It ensures that the data should not be altered by unauthorized people during the transmission.…”
Section: Bulletin Of Electr Eng and Infmentioning
confidence: 99%
“…Moreover, The effectiveness is the capability of the system in order to perform the desired output [9]. Meanwhile, effeciency is parameter measurable quality component development to achieve the undertaking process successfuly [10,11]. However, the effectiveness and security metrics mostly improve the performance in IT area.…”
Section: Introductionmentioning
confidence: 99%