The evaluation performance of letter-based techniques on text steganography method
The implementation of steganography as information hiding in research area is able in covering hidden message in text, image, audio and video. This paper focuses on the implementation of development steganography in text domain named text steganography. Mostly, the researcher utilize the text stegan...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Advanced Scientific Research
2018
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/5811/1/AJ%202018%20%28906%29%20The%20evaluation%20performance%20of%20letter-based%20techniques%20on%20text%20steganography%20method.pdf http://eprints.uthm.edu.my/5811/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uthm.eprints.5811 |
---|---|
record_format |
eprints |
spelling |
my.uthm.eprints.58112022-01-24T00:55:32Z http://eprints.uthm.edu.my/5811/ The evaluation performance of letter-based techniques on text steganography method Ismail, Azizan Din, Roshidi Mustapha, Aida Utama, Sunariya LB3050-3060.87 Educational tests, measurements, evaluations and examinations The implementation of steganography as information hiding in research area is able in covering hidden message in text, image, audio and video. This paper focuses on the implementation of development steganography in text domain named text steganography. Mostly, the researcher utilize the text steganography technique named feature-based technique that covers a hidden message based on the uniqueness of letters. One of the technique in feature-based is letter-based technique that is able to hide the hidden message in a language that uses A-Z letters. This paper focuses on the three techniques of letter-based text steganography that have a similar implementation process in covering the hidden message. The three techniques are evaluated using some parameters to obtain the size bit ratio, loading time and validation performance. This parameter used in order to notice that the process of covering the hidden message could be influence capacity of text, the length of time consuming and determine the quality performance in term of validation approach. Institute of Advanced Scientific Research 2018 Article PeerReviewed text en http://eprints.uthm.edu.my/5811/1/AJ%202018%20%28906%29%20The%20evaluation%20performance%20of%20letter-based%20techniques%20on%20text%20steganography%20method.pdf Ismail, Azizan and Din, Roshidi and Mustapha, Aida and Utama, Sunariya (2018) The evaluation performance of letter-based techniques on text steganography method. Journal of Advanced Research in Dymical and Control Systems. pp. 1684-1690. ISSN 1943-023X |
institution |
Universiti Tun Hussein Onn Malaysia |
building |
UTHM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tun Hussein Onn Malaysia |
content_source |
UTHM Institutional Repository |
url_provider |
http://eprints.uthm.edu.my/ |
language |
English |
topic |
LB3050-3060.87 Educational tests, measurements, evaluations and examinations |
spellingShingle |
LB3050-3060.87 Educational tests, measurements, evaluations and examinations Ismail, Azizan Din, Roshidi Mustapha, Aida Utama, Sunariya The evaluation performance of letter-based techniques on text steganography method |
description |
The implementation of steganography as information hiding in research area is able in covering hidden message in text, image, audio and video. This paper focuses on the implementation of development steganography in text domain named text steganography. Mostly, the researcher utilize the text steganography technique named feature-based technique that covers a hidden message based on the uniqueness of letters. One of the technique in feature-based is letter-based technique that is able to hide the hidden message in a language that uses A-Z letters. This paper focuses on the three techniques of letter-based text steganography that have a similar implementation process in covering the hidden message. The three techniques are evaluated using some parameters to obtain the size bit ratio, loading time and validation performance. This parameter used in order to notice that the process of covering the hidden message could be influence capacity of text, the length of time consuming and determine the quality performance in term of validation approach. |
format |
Article |
author |
Ismail, Azizan Din, Roshidi Mustapha, Aida Utama, Sunariya |
author_facet |
Ismail, Azizan Din, Roshidi Mustapha, Aida Utama, Sunariya |
author_sort |
Ismail, Azizan |
title |
The evaluation performance of letter-based techniques on text steganography method |
title_short |
The evaluation performance of letter-based techniques on text steganography method |
title_full |
The evaluation performance of letter-based techniques on text steganography method |
title_fullStr |
The evaluation performance of letter-based techniques on text steganography method |
title_full_unstemmed |
The evaluation performance of letter-based techniques on text steganography method |
title_sort |
evaluation performance of letter-based techniques on text steganography method |
publisher |
Institute of Advanced Scientific Research |
publishDate |
2018 |
url |
http://eprints.uthm.edu.my/5811/1/AJ%202018%20%28906%29%20The%20evaluation%20performance%20of%20letter-based%20techniques%20on%20text%20steganography%20method.pdf http://eprints.uthm.edu.my/5811/ |
_version_ |
1738581417668902912 |
score |
13.159267 |