A review on text steganography techniques

MA Majeed, R Sulaiman, Z Shukur, MK Hasan - Mathematics, 2021 - mdpi.com
There has been a persistent requirement for safeguarding documents and the data they
contain, either in printed or electronic form. This is because the fabrication and faking of …

A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

Reversible natural language watermarking using synonym substitution and arithmetic coding

W Hao, L Xiang, Y Li, P Yang, X Shen - 2018 - dr.ntu.edu.sg
For protecting the copyright of a text and recovering its original content harmlessly, this
paper proposes a novel reversible natural language watermarking method that combines …

CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data

R Thabit, NI Udzir, SM Yasin, A Asmawi… - IEEE Access, 2022 - ieeexplore.ieee.org
The rapid growth of online communication has increased the demand for secure
communication. Most government entities, healthcare providers, the legal sector, financial …

Recovery based high capacity reversible data hiding scheme using even-odd embedding

A Malik, S Singh, R Kumar - Multimedia Tools and Applications, 2018 - Springer
There have been discussed various data hiding methods which can embed the secret data
in an image. However, the image gets destroyed after extraction of the secret data at the …

[HTML][HTML] A novel steganography method using transliteration of Bengali text

M Khairullah - Journal of King Saud University-Computer and …, 2019 - Elsevier
In this paper, we present a simple and novel approach for steganography through
transliteration. A phonetic keyboard layout is very popular for writing languages having non …

Autoregressive linguistic steganography based on BERT and consistency coding

X Zheng, H Wu - Security and Communication Networks, 2022 - Wiley Online Library
Linguistic steganography (LS) conceals the presence of communication by embedding
secret information into a text. How to generate a high‐quality text carrying secret information …

[PDF][PDF] Text steganography on RNN-generated lyrics

Y Tong, YL Liu, J Wang, G Xin - Mathematical Biosciences and …, 2019 - aimspress.com
We present a Recurrent Neural Network (RNN) Encoder-Decoder model to generate
Chinese pop music lyrics to hide secret information. In particular, on a given initial line of a …

Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations

N Alanazi, E Khan, A Gutub - Arabian Journal for Science and Engineering, 2021 - Springer
This paper introduces a novel method for Arabic text steganography for irreversible practical
usage that involves using the spaces in Unicode standard. The method also benefits from …

A character based steganography using masked language modeling

E Öztürk, AŞ Mesut, ÖA Fıdan - IEEE Access, 2024 - ieeexplore.ieee.org
In this study, a steganography method based on BERT transformer model is proposed for
hiding text data in cover text. The aim is to hide information by replacing specific words …