scispace - formally typeset
Book ChapterDOI

Advances in Text Steganography Theory and Research: A Critical Review and Gaps

Reads0
Chats0
TLDR
This chapter presents a theoretical view and critical examination of the few text steganography methods in the contemporary world and tells the direction in which research has developed over the past few years.
Abstract
There is an immense advancement in science and technology, and computing systems with the highest degree of security are the present hot topic; however, the domination of hackers and espionage in terms of disclosing the sensitive information are steadily increasing. This chapter presents a theoretical view and critical examination of the few text steganography methods in the contemporary world. It tells the direction in which research has developed over the past few years. Cryptography, the encipherment to a certain extent, protects the data by making it unreadable but not safe. Improvisation of the same can be done using another layer of protection that is steganography in which the secret embedded inside the cover text will not be revealed.

read more

Citations
More filters
Journal ArticleDOI

A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography

TL;DR: In this paper , a format-based text concealing algorithm was proposed to deal with embedding capacity and invisibility issues in the context of public communication security and medical data protection.
References
More filters
Proceedings ArticleDOI

BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding

TL;DR: BERT as mentioned in this paper pre-trains deep bidirectional representations from unlabeled text by jointly conditioning on both left and right context in all layers, which can be fine-tuned with just one additional output layer to create state-of-the-art models for a wide range of tasks.
Journal ArticleDOI

Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research

TL;DR: A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.
Journal ArticleDOI

RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks

TL;DR: A linguistic steganography based on recurrent neural networks, which can automatically generate high-quality text covers on the basis of a secret bitstream that needs to be hidden, and achieves the state-of-the-art performance.
Journal ArticleDOI

An overview of steganography techniques applied to the protection of biometric data

TL;DR: An overview of steganography techniques applied in the protection of biometric data in fingerprints is presented and the strengths and weaknesses of targeted and blind steganalysis strategies for breaking steganographers techniques are discussed.
Journal ArticleDOI

DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation

TL;DR: Easy and effective algorithms for implementation of encryption and decryption based on DNA computing using biological operations Transcription, Translation, DNA Sequencing and Deep Learning are proposed in this paper.