2019
DOI: 10.3390/e21040355
|View full text |Cite
|
Sign up to set email alerts
|

Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis

Abstract: Modern text hiding is an intelligent programming technique which embeds a secret message/watermark into a cover text message/file in a hidden way to protect confidential information. Recently, text hiding in the form of watermarking and steganography has found broad applications in, for instance, covert communication, copyright protection, content authentication, etc. In contrast to text hiding, text steganalysis is the process and science of identifying whether a given carrier text file/message has hidden inf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
57
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 50 publications
(74 citation statements)
references
References 99 publications
0
57
0
1
Order By: Relevance
“…When programmers build a text hiding algorithm there are many things to remember. In recently implemented algorithms, however, the fundamental requirements can be easily found: invisibility, embedding power, robustness, and security [22]. For an active or passive warden, respectively, the contact medium through which the stego-image is being transmitted can be noisy or noiseless.…”
Section: B Arabic Text Hiding Criteriamentioning
confidence: 99%
“…When programmers build a text hiding algorithm there are many things to remember. In recently implemented algorithms, however, the fundamental requirements can be easily found: invisibility, embedding power, robustness, and security [22]. For an active or passive warden, respectively, the contact medium through which the stego-image is being transmitted can be noisy or noiseless.…”
Section: B Arabic Text Hiding Criteriamentioning
confidence: 99%
“…In this categorization, the zero-watermarking approaches are often not considered as no watermark is actually applied; however, this alternative solution is getting more attention lately and it is important to understand the difference between the zero-watermarking and contentpreserving methods. A recent survey [18] considers instead the structural, linguistic, and statistics as the three main categories. After highlighting the core ideas, advantages, and disadvantages of the mentioned approaches, we will focus on the structural methods.…”
Section: Related Workmentioning
confidence: 99%
“…In general, the PHR interoperability involves new requirements and challenges concerning technology, incentives, security and privacy, and governance which should be solved for data sharing issues. Technically, the use of blockchain technology in healthcare management system can provide five mechanisms including: (i) patient identity, (ii) data aggregation, (iii) data liquidity, (iv) digital access rules, and (v) data immutability, which might address such challenges [1][2][3]2]. However, several management systems exist for healthcare, which controls PHR, incredibly delicate data such as PHR entities [1][2][3].…”
Section: Introductionmentioning
confidence: 99%