2009
DOI: 10.3844/jcssp.2009.930.936
|View full text |Cite
|
Sign up to set email alerts
|

Information Hiding: A Generic Approach

Abstract: Problem statement: Privacy and security over communication channels are of primary concerns. Due to their complexity and diversity, there is a need for continuous improvements of the adopted solutions. In this study, we consider two of the adopted ones, namely, steganogrphy and cryptography and propose a new information hiding system. Approach: The proposed system was based on a generic approach that incorporates text-based steganography and cryptography methods in a way that permits their combined or stand al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
5
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…For example, the average size according to our system is 25% and the one according to the system proposed in [5] is 2%. However, the proposed system has better results in terms of the following:…”
mentioning
confidence: 84%
See 2 more Smart Citations
“…For example, the average size according to our system is 25% and the one according to the system proposed in [5] is 2%. However, the proposed system has better results in terms of the following:…”
mentioning
confidence: 84%
“…For the purpose of our research, we consider steganography as a method of hiding the existence of a bilingual secret message in Arabic text [4]. Textsteganography proceeds according to the following scheme [5]:  A secret message is concealed in a cover-text using an embedding algorithm to produce a stego-text.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“… Upon its delivery, the secret message is recovered using an extracting algorithm.  The embedding and the extracting algorithms are augmented by the so called a stego-key to encrypt and decrypt the hidden data respectively [3]. Text steganography is broadly classified into the two categories; Linguistic steganography which is further divided into semantic and syntactic method and format based steganography which is further divided into line-shift, word-shift, open-space and feature encoding [4] as described in the fig.…”
Section: Robustnessmentioning
confidence: 99%
“…The related studies in hiding text are line shifting , Word Shifting (Kim et al, 2003), semantic methods feature coding (Rabah, 2004), Abbreviation (Bender et al, 1996), Open Spaces (Huang and Yan, 2000), Persian/Arabic Text steganography and hiding dynamic and static text within a cover-text (Riad et al, 2009). The methods which study on hiding data in SMS are Stealth Steganography in SMS, which steganography in the pictures of SMS messages (Shirali-Shahreza, 2006) and Text Steganography in SMS which use and develop abbreviation text steganography with the use of the invented language of SMS-Texting (Shirali-Shahreza and Shirali-Shahreza, 2007).…”
Section: Introductionmentioning
confidence: 99%