Osman, Baharudin and Yasin, Azman and Omar, Mohd Nizam (2016) An analysis of alphabet-based techniques in text steganography. Journal of Telecommunication, Electronic and Computer Engineering, 8 (10). pp. 109-115. ISSN 2180-1843
Preview |
PDF
Available under License Creative Commons Attribution. Download (614kB) | Preview |
Abstract
Steganography and cryptography are methods in information hiding.Cryptography scrambles the secret message, whereas steganography conceals a secret message in a carrier medium.An audio, video, image, and text can be used as a cover medium for hiding messages in steganography. The final output of steganography is a stego object that is sent to a receiver using a stego key. Suspiciousness of a generated stego text will encourage eavesdroppers to reveal the hidden message from stego text. Having reviewed substitution, injection, and propagation techniques for steganography, this paper discovers that there is a suspicion in the generated stego text. It is also discovered that text steganography using Genetic Algorithm (GA) is less focused by researchers compared to image and audio.Accordingly, this paper proposes that the adoption of GA should be focused in future works to protect stego text from suspiciousness due to the effectiveness and efficiency used in other media.Suspiciousness against stego text is very important in steganography to avoid third parties detecting the existence of secret message.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Cryptography; Genetic Algorithm; Mapping Method; Steganography; Suspicious Stego Text. |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | School of Computing |
Depositing User: | Mr. Baharudin Osman |
Date Deposited: | 04 Jan 2017 02:00 |
Last Modified: | 04 Jan 2017 02:00 |
URI: | https://repo.uum.edu.my/id/eprint/20540 |
Actions (login required)
View Item |