Book ChapterDOI
Advances in Text Steganography Theory and Research: A Critical Review and Gaps
R. Gurunath,Debabrata Samanta +1 more
- pp 50-74
Reads0
Chats0
TLDR
This chapter presents a theoretical view and critical examination of the few text steganography methods in the contemporary world and tells the direction in which research has developed over the past few years.Abstract:
There is an immense advancement in science and technology, and computing systems with the highest degree of security are the present hot topic; however, the domination of hackers and espionage in terms of disclosing the sensitive information are steadily increasing. This chapter presents a theoretical view and critical examination of the few text steganography methods in the contemporary world. It tells the direction in which research has developed over the past few years. Cryptography, the encipherment to a certain extent, protects the data by making it unreadable but not safe. Improvisation of the same can be done using another layer of protection that is steganography in which the secret embedded inside the cover text will not be revealed.read more
Citations
More filters
Journal ArticleDOI
A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography
R. Gurunath,Debabrata Samanta +1 more
TL;DR: In this paper , a format-based text concealing algorithm was proposed to deal with embedding capacity and invisibility issues in the context of public communication security and medical data protection.
References
More filters
Proceedings ArticleDOI
BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
TL;DR: BERT as mentioned in this paper pre-trains deep bidirectional representations from unlabeled text by jointly conditioning on both left and right context in all layers, which can be fine-tuned with just one additional output layer to create state-of-the-art models for a wide range of tasks.
Journal ArticleDOI
Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research
TL;DR: A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.
Journal ArticleDOI
RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks
TL;DR: A linguistic steganography based on recurrent neural networks, which can automatically generate high-quality text covers on the basis of a secret bitstream that needs to be hidden, and achieves the state-of-the-art performance.
Journal ArticleDOI
An overview of steganography techniques applied to the protection of biometric data
TL;DR: An overview of steganography techniques applied in the protection of biometric data in fingerprints is presented and the strengths and weaknesses of targeted and blind steganalysis strategies for breaking steganographers techniques are discussed.
Journal ArticleDOI
DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation
TL;DR: Easy and effective algorithms for implementation of encryption and decryption based on DNA computing using biological operations Transcription, Translation, DNA Sequencing and Deep Learning are proposed in this paper.