Abstract

Modern text hiding is an intelligent programming technique which embeds a secret message/watermark into a cover text message/file in a hidden way to protect confidential information. Recently, text hiding in the form of watermarking and steganography has found broad applications in, for instance, covert communication, copyright protection, content authentication, etc. In contrast to text hiding, text steganalysis is the process and science of identifying whether a given carrier text file/message has hidden information in it, and, if possible, extracting/detecting the embedded hidden information. This paper presents an overview of state of the art of the text hiding area, and provides a comparative analysis of recent techniques, especially those focused on marking structural characteristics of digital text message/file to hide secret bits. Also, we discuss different types of attacks and their effects to highlight the pros and cons of the recently introduced approaches. Finally, we recommend some directions and guidelines for future works.

Highlights

  • Reflecting the new trends and rapid progress in the field of information technology in the form of smart gadgets, communications, and digital content, an extensive environment with the capability to transfer, copy, duplicate, and share information over the Internet has been built, this revolution in the digital world and the online distribution of digital media implies that such information is vulnerable to malicious attacks, unauthorized access, forgery, plagiarism, etc

  • Invisibility refers to how many perceptual modifications are made in the CMHM after embedding an invisibility refers to how many perceptual modifications are made in the CMHM after embedding an hidden message (HM)

  • Let us suppose that a malicious user copies a portion of the CMHM which included the SMbits into a new host text message/file and randomly modifies it in terms of mentioned attacks

Read more

Summary

Introduction

Reflecting the new trends and rapid progress in the field of information technology in the form of smart gadgets, communications, and digital content, an extensive environment with the capability to transfer, copy, duplicate, and share information over the Internet has been built, this revolution in the digital world and the online distribution of digital media implies that such information is vulnerable to malicious attacks, unauthorized access, forgery, plagiarism, etc. Information hiding plain-text (secret data) into cipher to prevent unauthorized access to its content. We summarize some of the recently proposed text hiding techniques which are focused on the structure of the cover text message/file to conceal secret information. The rest of the paper is organized as follows: Section 2 presents some background literature and and related studies on the information hiding area. Text Hiding Schema and Bob are locked up in two separated cells but are permitted to communicate under the watch of Theprison basic scenario a cryptography channel is Simmons’. From symbols the digital data hiding point of view, text a cover message/file (CM) by marking invisible where the trace of embedding the SM is steganography/watermarking is a vision different scenario which works based Text on the practice of hiding a invisible/undetectable by human systems.

1: Pseudocode of of
Encrypted
The Unicode Standard
The most utilized special
Hidden Communication
Network Covert Channels
Unauthorized Access Detection
Text Hiding Criteria
Invisibility
Security
Computational Complexity
Text Steganalysis and Attacks
Visual Attacks
Structural Attacks
Statistical Attacks
Various Types of Text Hiding Techniques
Structural
Open Space
Feature
Emoticons
LinguisticTechniques
Semantic
Syntactic
Random and Statistics Techniques
Compression
Random Cover
An Empirical Comparison
Efficiency Analysis of Recent Structural Techniques
15. Approximate
Limitations
Suggestions for Future Works
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call