Lockwood et al., 2017 - Google Patents
Text based steganographyLockwood et al., 2017
View PDF- Document ID
- 4506567951192535751
- Author
- Lockwood R
- Curran K
- Publication year
- Publication venue
- International Journal of Information Privacy, Security and Integrity
External Links
Snippet
Steganography is the art of hiding information within other less conspicuous information to prevent eavesdropping by way of hiding its existence in the first place. Image based steganography is the most common form but text based steganography can also be used …
- 230000003278 mimic 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/28—Processing or translating of natural language
- G06F17/2809—Data driven translation
- G06F17/2827—Example based machine translation; Alignment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/28—Processing or translating of natural language
- G06F17/2872—Rule based translation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/28—Processing or translating of natural language
- G06F17/2863—Processing of non-latin text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/28—Processing or translating of natural language
- G06F17/289—Use of machine translation, e.g. multi-lingual retrieval, server side translation for client devices, real-time translation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2765—Recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2217—Character encodings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lockwood et al. | Text based steganography | |
| US10885225B2 (en) | Protecting personally identifiable information (PII) using tagging and persistence of PII | |
| US11356482B2 (en) | Message validation using machine-learned user models | |
| US9160719B2 (en) | Hiding ciphertext using a linguistics algorithm with dictionaries | |
| Satir et al. | A Huffman compression based text steganography method | |
| Por et al. | Whitesteg: a new scheme in information hiding using text steganography | |
| US20250150267A1 (en) | Method of semantic transposition of text into an unrelated semantic domain for secure, deniable, stealth encryption | |
| Raggo et al. | Data hiding: exposing concealed data in multimedia, operating systems, mobile devices and network protocols | |
| US10114900B2 (en) | Methods and systems for generating probabilistically searchable messages | |
| Dulera et al. | Experimenting with the novel approaches in text steganography | |
| Gupta Banik et al. | Novel text steganography using natural language processing and part-of-speech tagging | |
| US20180262474A1 (en) | Systems and Methods for Secure Online Communication | |
| Kaushik et al. | Zero-width text steganography in cybercrime attacks | |
| CN114880687A (en) | Document security protection method, device, electronic device and storage medium | |
| Dickman | An overview of steganography | |
| Bergmair | Towards linguistic steganography: A systematic investigation of approaches, systems, and issues | |
| Ivasenko et al. | Information transmission protection using linguistic steganography with arithmetic encoding and decoding approach | |
| Alsaadi et al. | Text steganography in font color of MS excel sheet | |
| CN119323015A (en) | Data generation method, text generation method and electronic equipment | |
| Gaur et al. | A new PDAC (parallel encryption with digit arithmetic of cover text) based text steganography approach for cloud data security | |
| Nechta | Steganography in social networks | |
| Bergmair et al. | Content-aware steganography: about lazy prisoners and narrow-minded wardens | |
| Al Azzam | The AI algorithm for text encryption using Steganography | |
| Desoky | Notestega: notes-based steganography methodology | |
| Perry et al. | Robust Steganography from Large Language Models |