Researcher's Perspective of Substitution Method on Text Steganography

被引:1
|
作者
Mansor, Fawwaz Zamir [1 ]
Mustapha, Aida [1 ]
Samsudin, Noor Azah [1 ]
机构
[1] Univ Tun Hussein Onn Malaysia UTHM, Fac Comp Sci & Informat Technol, Batu Pahat 86400, Johor, Malaysia
关键词
D O I
10.1088/1757-899X/226/1/012092
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The linguistic steganography studies are still in the stage of development and empowerment practices. This paper will present several text steganography on substitution methods based on the researcher's perspective, all scholar paper will analyse and compared. The objective of this paper is to give basic information in the substitution method of text domain steganography that has been applied by previous researchers. The typical ways of this method also will be identified in this paper to reveal the most effective method in text domain steganography. Finally, the advantage of the characteristic and drawback on these techniques in generally also presented in this paper.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] An Innovative Method of Text Steganography
    Gupta, Shashank
    Jain, Rachit
    [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 60 - 64
  • [2] A Method for Text Steganography Using Malayalam Text
    Vidhya, P. M.
    Paul, Varghese
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 524 - 531
  • [3] A researcher's perspective
    Lowton, Karen
    [J]. BRITISH MEDICAL JOURNAL, 2007, 334 (7606): : 1271 - 1271
  • [4] Unicode-based method for text steganography with Malayalam text
    Vidhya, P. M.
    Paul, Varghese
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 28 (04) : 1591 - 1600
  • [5] An Improved Module Based Substitution Steganography Method
    Akhtar, Nadeem
    Bano, Ambreen
    Islam, Faraz
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 695 - 698
  • [6] An LSB Substitution with Bit Inversion Steganography Method
    Akhtar, Nadeem
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (ICACNI 2015), VOL 1, 2016, 43 : 515 - 521
  • [7] A Text Steganography Method Based on Markov Chains
    Shniperov, A. N.
    Nikitina, K. A.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (08) : 802 - 808
  • [8] A compression-based text steganography method
    Satir, Esra
    Isik, Hakan
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (10) : 2385 - 2394
  • [9] Text Steganography Based on Feature Coding Method
    Chaudhary, Sunita
    Dave, Meenu
    Sanghi, Amit
    [J]. INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,
  • [10] A Huffman compression based text steganography method
    Esra Satir
    Hakan Isik
    [J]. Multimedia Tools and Applications, 2014, 70 : 2085 - 2110