2019 IEEE 19th International Conference on Communication Technology (ICCT) 2019
DOI: 10.1109/icct46805.2019.8947188
|View full text |Cite
|
Sign up to set email alerts
|

Text Cover Steganography Using Font Color of the Invisible Characters and Optimized Primary Color-intensities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…The arrangement of the data and text in the document defines the structure of the content of the document.xml. In contrast to [1], the number of tags available for secret message encoding does not forcefully increase as the number of words in the document grows. Table 2 reports the embedding capacity of two covers of different sizes.…”
Section: Embedding Capacitymentioning
confidence: 95%
See 3 more Smart Citations
“…The arrangement of the data and text in the document defines the structure of the content of the document.xml. In contrast to [1], the number of tags available for secret message encoding does not forcefully increase as the number of words in the document grows. Table 2 reports the embedding capacity of two covers of different sizes.…”
Section: Embedding Capacitymentioning
confidence: 95%
“…Unlike [1] and all similar works that are entirely relying on the structural modifications not having explicit visual modification on the content of the Word file cover, drastic changes are often noticed being applied to the document.xml file. These changes, frequently not being unnoticed to the eyes of an expert (like Eve), have not been considered in most of the previous works.…”
Section: Structural Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…One method for securing information is steganography [2]. There are several types of steganography based on the covers used for camouflaging secret messages such as audio steganography [3], text steganography [4,5,6], image steganography [7,8], and video steganography [9,10]. Steganography can be classified as noisy [7,9] and noiseless [11,12].…”
Section: Introductionmentioning
confidence: 99%