The evaluation performance of letter-based techniques on text steganography method

The implementation of steganography as information hiding in research area is able in covering hidden message in text, image, audio and video. This paper focuses on the implementation of development steganography in text domain named text steganography. Mostly, the researcher utilize the text stegan...

Full description

Saved in:
Bibliographic Details
Main Authors: Ismail, Azizan, Din, Roshidi, Mustapha, Aida, Utama, Sunariya
Format: Article
Language:English
Published: Institute of Advanced Scientific Research 2018
Subjects:
Online Access:http://eprints.uthm.edu.my/5811/1/AJ%202018%20%28906%29%20The%20evaluation%20performance%20of%20letter-based%20techniques%20on%20text%20steganography%20method.pdf
http://eprints.uthm.edu.my/5811/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uthm.eprints.5811
record_format eprints
spelling my.uthm.eprints.58112022-01-24T00:55:32Z http://eprints.uthm.edu.my/5811/ The evaluation performance of letter-based techniques on text steganography method Ismail, Azizan Din, Roshidi Mustapha, Aida Utama, Sunariya LB3050-3060.87 Educational tests, measurements, evaluations and examinations The implementation of steganography as information hiding in research area is able in covering hidden message in text, image, audio and video. This paper focuses on the implementation of development steganography in text domain named text steganography. Mostly, the researcher utilize the text steganography technique named feature-based technique that covers a hidden message based on the uniqueness of letters. One of the technique in feature-based is letter-based technique that is able to hide the hidden message in a language that uses A-Z letters. This paper focuses on the three techniques of letter-based text steganography that have a similar implementation process in covering the hidden message. The three techniques are evaluated using some parameters to obtain the size bit ratio, loading time and validation performance. This parameter used in order to notice that the process of covering the hidden message could be influence capacity of text, the length of time consuming and determine the quality performance in term of validation approach. Institute of Advanced Scientific Research 2018 Article PeerReviewed text en http://eprints.uthm.edu.my/5811/1/AJ%202018%20%28906%29%20The%20evaluation%20performance%20of%20letter-based%20techniques%20on%20text%20steganography%20method.pdf Ismail, Azizan and Din, Roshidi and Mustapha, Aida and Utama, Sunariya (2018) The evaluation performance of letter-based techniques on text steganography method. Journal of Advanced Research in Dymical and Control Systems. pp. 1684-1690. ISSN 1943-023X
institution Universiti Tun Hussein Onn Malaysia
building UTHM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tun Hussein Onn Malaysia
content_source UTHM Institutional Repository
url_provider http://eprints.uthm.edu.my/
language English
topic LB3050-3060.87 Educational tests, measurements, evaluations and examinations
spellingShingle LB3050-3060.87 Educational tests, measurements, evaluations and examinations
Ismail, Azizan
Din, Roshidi
Mustapha, Aida
Utama, Sunariya
The evaluation performance of letter-based techniques on text steganography method
description The implementation of steganography as information hiding in research area is able in covering hidden message in text, image, audio and video. This paper focuses on the implementation of development steganography in text domain named text steganography. Mostly, the researcher utilize the text steganography technique named feature-based technique that covers a hidden message based on the uniqueness of letters. One of the technique in feature-based is letter-based technique that is able to hide the hidden message in a language that uses A-Z letters. This paper focuses on the three techniques of letter-based text steganography that have a similar implementation process in covering the hidden message. The three techniques are evaluated using some parameters to obtain the size bit ratio, loading time and validation performance. This parameter used in order to notice that the process of covering the hidden message could be influence capacity of text, the length of time consuming and determine the quality performance in term of validation approach.
format Article
author Ismail, Azizan
Din, Roshidi
Mustapha, Aida
Utama, Sunariya
author_facet Ismail, Azizan
Din, Roshidi
Mustapha, Aida
Utama, Sunariya
author_sort Ismail, Azizan
title The evaluation performance of letter-based techniques on text steganography method
title_short The evaluation performance of letter-based techniques on text steganography method
title_full The evaluation performance of letter-based techniques on text steganography method
title_fullStr The evaluation performance of letter-based techniques on text steganography method
title_full_unstemmed The evaluation performance of letter-based techniques on text steganography method
title_sort evaluation performance of letter-based techniques on text steganography method
publisher Institute of Advanced Scientific Research
publishDate 2018
url http://eprints.uthm.edu.my/5811/1/AJ%202018%20%28906%29%20The%20evaluation%20performance%20of%20letter-based%20techniques%20on%20text%20steganography%20method.pdf
http://eprints.uthm.edu.my/5811/
_version_ 1738581417668902912
score 13.159267