Improving stego key using extended-1 and extended-2 techniques of feature coding method in text steganography
This study focuses on implementing steganography in the text domain called text steganography. Many previous researchers utilize a method in text steganography called the feature coding method to conceal the hidden message based on the uniqueness of the letter in the text. It highlights some feature...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English English English |
Published: |
2024
|
Subjects: | |
Online Access: | https://etd.uum.edu.my/11489/1/Depositpermission_not%20Allow-s902955.pdf https://etd.uum.edu.my/11489/2/s902955_01.pdf https://etd.uum.edu.my/11489/3/s902955_02.pdf https://etd.uum.edu.my/11489/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uum.etd.11489 |
---|---|
record_format |
eprints |
spelling |
my.uum.etd.114892025-01-06T04:03:06Z https://etd.uum.edu.my/11489/ Improving stego key using extended-1 and extended-2 techniques of feature coding method in text steganography Utama, Sunariya L Education (General) T Technology (General) This study focuses on implementing steganography in the text domain called text steganography. Many previous researchers utilize a method in text steganography called the feature coding method to conceal the hidden message based on the uniqueness of the letter in the text. It highlights some feature coding methods that are applied alphabet A-Z letters. However, the existences of technique in feature coding method are easily to recognize due the obvious group of letter pattern text in chosen hidden message. Therefore, the objective is to propose the feature coding of text steganography using binary bit representation. It chose specific group letter for the stego key that begins with identifying the scheme of this technique. Subsequently, this study develops an extension technique that adapts the existing techniques of feature coding method. The proposed extended technique consists of Extended-1 and Extended-2 techniques of feature coding method. It compares the existing and extended techniques feature coding that is evaluated using some parameters to assess performance of technique. The experimental results show that the Extended-1 technique has the highest capacity ratio performance, with 100% recall rate, 46.15% F-measure rate, and 30% precision and accuracy rates. Meanwhile, the Extended-2 technique exhibits the highest robustness and security performance, achieving 100% performance for precision, recall, accuracy, and F-measure rates. The output of this study generates the extended technique in feature coding that is expected to contribute to the improvement of text steganography. For future work, the technique's utilization of feature coding method in artificial intelligence tools to enhance information security and also as a current trend in the IT field. 2024 Thesis NonPeerReviewed text en https://etd.uum.edu.my/11489/1/Depositpermission_not%20Allow-s902955.pdf text en https://etd.uum.edu.my/11489/2/s902955_01.pdf text en https://etd.uum.edu.my/11489/3/s902955_02.pdf Utama, Sunariya (2024) Improving stego key using extended-1 and extended-2 techniques of feature coding method in text steganography. Doctoral thesis, Universiti Utara Malaysia. |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Electronic Theses |
url_provider |
http://etd.uum.edu.my/ |
language |
English English English |
topic |
L Education (General) T Technology (General) |
spellingShingle |
L Education (General) T Technology (General) Utama, Sunariya Improving stego key using extended-1 and extended-2 techniques of feature coding method in text steganography |
description |
This study focuses on implementing steganography in the text domain called text steganography. Many previous researchers utilize a method in text steganography called the feature coding method to conceal the hidden message based on the uniqueness of the letter in the text. It highlights some feature coding methods that are applied alphabet A-Z letters. However, the existences of technique in feature coding method are easily to recognize due the obvious group of letter pattern text in chosen hidden message. Therefore, the objective is to propose the feature coding of text steganography using binary bit representation. It chose specific group letter for the stego key that begins with identifying the scheme of this technique. Subsequently, this study develops an extension technique that adapts the existing techniques of feature coding method. The proposed extended technique consists of Extended-1 and Extended-2 techniques of feature coding method. It compares the existing and extended techniques feature coding that is evaluated using some parameters to assess performance of technique. The experimental results show that the Extended-1 technique has the highest capacity ratio performance, with 100% recall rate, 46.15%
F-measure rate, and 30% precision and accuracy rates. Meanwhile, the Extended-2 technique exhibits the highest robustness and security performance, achieving 100% performance for precision, recall, accuracy, and F-measure rates. The output of this study generates the extended technique in feature coding that is expected to contribute to the improvement of text steganography. For future work, the technique's utilization of feature coding method in artificial intelligence tools to enhance information security and also as a current trend in the IT field. |
format |
Thesis |
author |
Utama, Sunariya |
author_facet |
Utama, Sunariya |
author_sort |
Utama, Sunariya |
title |
Improving stego key using extended-1 and extended-2 techniques of feature coding method in text steganography |
title_short |
Improving stego key using extended-1 and extended-2 techniques of feature coding method in text steganography |
title_full |
Improving stego key using extended-1 and extended-2 techniques of feature coding method in text steganography |
title_fullStr |
Improving stego key using extended-1 and extended-2 techniques of feature coding method in text steganography |
title_full_unstemmed |
Improving stego key using extended-1 and extended-2 techniques of feature coding method in text steganography |
title_sort |
improving stego key using extended-1 and extended-2 techniques of feature coding method in text steganography |
publishDate |
2024 |
url |
https://etd.uum.edu.my/11489/1/Depositpermission_not%20Allow-s902955.pdf https://etd.uum.edu.my/11489/2/s902955_01.pdf https://etd.uum.edu.my/11489/3/s902955_02.pdf https://etd.uum.edu.my/11489/ |
_version_ |
1821005244553756672 |
score |
13.235796 |