The Security of Arithmetic Compression Based Text Steganography Method
نویسندگان
چکیده
منابع مشابه
An Information Security Approach Based on Text Steganography
Frequency of attacks and intrusions are rising at an alarming rate, thus importance of having a secure mechanism for communication is paramount. Encryption is a robust method for security but its employment attracts eavesdropper’s attention. Steganography comes to rescue by hiding the existence of communication by concealing the secret message in a cover media like text, image, audio or video. ...
متن کاملA Generation-based Text Steganography Method using SQL Queries
Cryptography and Steganography are two techniques commonly used to secure and safely transmit digital data. Nevertheless, they do differ in important ways. In fact, cryptography scrambles data so that they become unreadable by eavesdroppers; while, steganography hides the very existence of data so that they can be transferred unnoticed. Basically, steganography is a technique for hiding data su...
متن کاملDual security-based image steganography
In this paper, an image steganographic method with security level confined to a dual security criterion is addressed. Dual security is designed to be measured by kurtosis in the spatial domain and by relative entropy in the frequency domain, simultaneously. Messages are encoded into the wavelet domain by adjusting the magnitude (least few significant bits) relationship between four neighboring ...
متن کاملthe impact of skopos on syntactic features of the target text
the present study is an experimental case study which investigates the impacts, if any, of skopos on syntactic features of the target text. two test groups each consisting of 10 ma students translated a set of sentences selected from advertising texts in the operative and informative mode. the resulting target texts were then statistically analyzed in terms of the number of words, phrases, si...
15 صفحه اولEffective Steganography Detection Based On Data Compression
(The main idea: The compression used for stegotext detection. It is known that an embedding message breaks statistical structure of the container, increasing its entropy. Consequently, the full container will compress worse than empty. Let us consider the example: A, B empty and full container respectively. Table 1: Container size before and after compression container.. container size before c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)
سال: 2013
ISSN: 2088-8708
DOI: 10.11591/ijece.v3i6.4068