A review on text steganography techniques
There has been a persistent requirement for safeguarding documents and the data they
contain, either in printed or electronic form. This is because the fabrication and faking of …
contain, either in printed or electronic form. This is because the fabrication and faking of …
A comprehensive survey of covert communication techniques, limitations and future challenges
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …
while in processing. However, it is not always the optimum choice as attackers know the …
Reversible natural language watermarking using synonym substitution and arithmetic coding
W Hao, L **ang, Y Li, P Yang, X Shen - 2018 - dr.ntu.edu.sg
For protecting the copyright of a text and recovering its original content harmlessly, this
paper proposes a novel reversible natural language watermarking method that combines …
paper proposes a novel reversible natural language watermarking method that combines …
CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data
The rapid growth of online communication has increased the demand for secure
communication. Most government entities, healthcare providers, the legal sector, financial …
communication. Most government entities, healthcare providers, the legal sector, financial …
Recovery based high capacity reversible data hiding scheme using even-odd embedding
There have been discussed various data hiding methods which can embed the secret data
in an image. However, the image gets destroyed after extraction of the secret data at the …
in an image. However, the image gets destroyed after extraction of the secret data at the …
[HTML][HTML] A novel steganography method using transliteration of Bengali text
M Khairullah - Journal of King Saud University-Computer and …, 2019 - Elsevier
In this paper, we present a simple and novel approach for steganography through
transliteration. A phonetic keyboard layout is very popular for writing languages having non …
transliteration. A phonetic keyboard layout is very popular for writing languages having non …
Autoregressive linguistic steganography based on BERT and consistency coding
X Zheng, H Wu - Security and Communication Networks, 2022 - Wiley Online Library
Linguistic steganography (LS) conceals the presence of communication by embedding
secret information into a text. How to generate a high‐quality text carrying secret information …
secret information into a text. How to generate a high‐quality text carrying secret information …
[PDF][PDF] Text steganography on RNN-generated lyrics
Y Tong, YL Liu, J Wang, G **n - Mathematical Biosciences and …, 2019 - aimspress.com
We present a Recurrent Neural Network (RNN) Encoder-Decoder model to generate
Chinese pop music lyrics to hide secret information. In particular, on a given initial line of a …
Chinese pop music lyrics to hide secret information. In particular, on a given initial line of a …
A character based steganography using masked language modeling
E Öztürk, AŞ Mesut, ÖA Fıdan - IEEE Access, 2024 - ieeexplore.ieee.org
In this study, a steganography method based on BERT transformer model is proposed for
hiding text data in cover text. The aim is to hide information by replacing specific words …
hiding text data in cover text. The aim is to hide information by replacing specific words …
Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations
This paper introduces a novel method for Arabic text steganography for irreversible practical
usage that involves using the spaces in Unicode standard. The method also benefits from …
usage that involves using the spaces in Unicode standard. The method also benefits from …