2016
DOI: 10.1002/sec.1757
|View full text |Cite
|
Sign up to set email alerts
|

Text steganography: a novel character‐level embedding algorithm using font attribute

Abstract: Text Steganography uses text documents as cover medium to communicate the secret messages, covertly, by making unnoticeable distortions in the cover medium. Character-Level Embedding Technique (CLET), a variant of text steganography, embeds a secret character by serially marking/distorting an identical character in the cover medium. Hence, these techniques suffer from low embedding capacity as the occurrence of certain alphabets in a text document is not uniform/guaranteed. In addition, identification of the m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 27 publications
0
12
0
Order By: Relevance
“…The algorithm can only be applied to specific languages, hence there is a need to extend its embedded method to be applied in any language. The concept of utilizing the font attributes and character frequency to embed the secret characters was presented by the authors of [56]. To accomplish the uniform appropriation in stego characters with the uniform hiding likelihood, this method integrates four models: Frequency Normalization Set (FNS), Character String Mapping (CSM), embedding, and extracting.…”
Section: English-basedmentioning
confidence: 99%
“…The algorithm can only be applied to specific languages, hence there is a need to extend its embedded method to be applied in any language. The concept of utilizing the font attributes and character frequency to embed the secret characters was presented by the authors of [56]. To accomplish the uniform appropriation in stego characters with the uniform hiding likelihood, this method integrates four models: Frequency Normalization Set (FNS), Character String Mapping (CSM), embedding, and extracting.…”
Section: English-basedmentioning
confidence: 99%
“…In the Unicode, there are special zero-width characters (ZWC) which are employed to provide specific entities such as Zero Width Joiner (ZWJ), e.g., ZWJ joins two supportable characters together in particular languages, POP directional, and Zero Width Non-Joiner (ZWNJ), etc. Practically, the ZWC characters do not have traces, widths or written symbol in digital texts [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 11 , 15 , 18 , 25 , 26 , 27 , 28 , 33 , 34 , 41 , 42 , 43 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 ,…”
Section: Literature Reviewmentioning
confidence: 99%
“…The feature/format-based methods involve modifying some features of the cover text such as font size, style, color, etc. that could be altered to conceal secret bites [ 18 , 21 , 24 ]. For instance, the dotting feature of the Arabic texts can be used for marking the SM bits by displacing letter points and diacritics [ 116 , 117 , 118 , 119 ].…”
Section: Various Types Of Text Hiding Techniquesmentioning
confidence: 99%
See 2 more Smart Citations