A Survey of Text Steganography Methods
DOI:
https://doi.org/10.32628/IJSRST218348Keywords:
Steganography, data hiding, steganography text in text, media, information, security.Abstract
Phishing is that the most typical and most dangerous attack among cybercrimes. The aim of these attacks is to steal the data that’s utilized by people and organizations to perform transactions or any vital info. The goal of this is often to perform an Extreme Learning Sending encrypted messages frequently will draw the attention of third parties, i.e. hackers, perhaps causing attempts to break and reveal the original messages. In a digital world, steganography is introduced to hide the existence of the communication by concealing a secret message inside another unsuspicious message. This paper presents an overview of text steganography and a brief history of steganography along with various existing text-based steganography techniques.
References
- Gupta, S. and R. Jain, 2015. An innovative method of Text Steganography. Proceedings of the 2015 3rd International Conference on Image Information Processing (ICIIP’15), December 21-24, 2015, IEEE, Waknaghat, India, pp: 60-64
- Mandal, K.K., A. Jana and V. Agarwal, 2014. A new approach of text Steganography based on mathematical model of number system. Proceedings of the 2014 International Conference on Circuits, Power and Computing Technologies (ICCPCT’14), March 20-21, 2014, IEEE, Nagercoil, India,pp: 1737-1741.
- Jaeyoung Kim, Hanhoon Park, Jong-Il Park, “Image Steganography Based on Blcok Matching in DWT Domain”.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.