STBS-Stega: Coverless text steganography based on state transition-binary sequence [PDF]
Information-hiding technology has recently developed into an area of significant interest in the field of information security. As one of the primary carriers in steganography, it is difficult to hide information in texts because there is insufficient ...
Ning Wu +6 more
doaj +3 more sources
A Coverless Plain Text Steganography Based on Character Features [PDF]
The coverless text steganography has become a research hotspot in the field of information hiding because no modification to a text carrier will improve the concealment of steganography. However, compared with images, audios, videos, or other carriers, a
Kaixi Wang, Quansheng Gao
doaj +3 more sources
Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association [PDF]
Recently, researchers have shown that coverless steganography is relatively safe. On this basis, to improve the payload of the coverless steganography, a novel semiconstruction coverless steganography algorithm is introduced in the paper. Firstly, web crawler technology is applied to crawl a wide range of small icons and hot news images from the ...
Yajing Hao +4 more
openaire +2 more sources
A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures
The current coverless text steganography methods have a low steganographic capacity, and yet some of them cannot assure a message can be concealed. How to achieve a high steganographic capacity has become the research hotspot in text steganography. This paper proposes a text coverless steganography method by encoding the Chinese characters’ component ...
Kaixi Wang, Xiangmei Yu, Ziyi Zou
openaire +3 more sources
Research on Coverless Text Steganography Based on Single Bit Rules
Abstract Text steganography has become a hotspot in the field of information security in recent years. As an important steganographic carrier, text does not have the advantage that other multimedia could easily use more redundancy to hide information.
Ning Wu +5 more
openaire +2 more sources
Coverless Text Steganography Based on Maximum Variable Bit Embedding Rules
As a carrier of information hiding, text is difficult to hide secret because of its less redundancy. The robustness and security of some traditional methods based text are not high. Based on Markov chain model, a coverless text steganography algorithm was proposed in this paper. According to the characteristic and value of transition probability in the
Ning Wu +5 more
openaire +2 more sources
A Coverless Text Steganography by Encoding the Chinese Characters’ Component Structures
The current coverless text steganography methods have a low steganographic capacity, and yet some of them cannot assure a message can be concealed. How to achieve a high steganographic capacity has become the research hotspot in text steganography. This paper proposes a text coverless steganography method by encoding the Chinese characters’ component ...
openaire +2 more sources
An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS [PDF]
Yuling Liu, Jiao Wu, Xianyi Chen
openaire +2 more sources
Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning
The most significant factor to consider during private information transmission through the internet (i.e., insecure channel) is security. So, to keep this data from unauthorized access during transmission, steganography is used.
Al Hussien S. Saad +2 more
doaj +1 more source
Securing Messages by Using Coverless Steganography : A Survey [PDF]
In the last few decades, with the digitalization of information, digital data transmitted overinsecure communication can be under attack, so driving steganography to the forefront for securecommunication.
NAHLA F. OMRAN, NADA R. MAHMOUD, ABDELMAGEID A. ALI
core +2 more sources

