Roy et al., 2011 - Google Patents
A novel approach to format based text steganographyRoy et al., 2011
View PDF- Document ID
- 9970634018256273094
- Author
- Roy S
- Manasmita M
- Publication year
- Publication venue
- proceedings of the 2011 international conference on communication, Computing & Security
External Links
Snippet
Steganography gained importance in the past few years due to the increasing need for providing secrecy in an open environment like the internet. With almost anyone can observe the communicated data all around, steganography attempts to hide the very existence of the …
- 238000000034 method 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/211—Formatting, i.e. changing of presentation of document
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/24—Editing, e.g. insert/delete
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Roy et al. | A novel approach to format based text steganography | |
| Sharma et al. | Analysis of different text steganography techniques: a survey | |
| Yadav et al. | A novel approach of bulk data hiding using text steganography | |
| CN102360413B (en) | Steganographic method with misguiding function of controllable secret key sequence | |
| Singh et al. | A novel approach of text steganography based on null spaces | |
| Tayyeh et al. | Novel steganography scheme using Arabic text features in Holy Quran | |
| Thabit et al. | CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data | |
| Baawi et al. | A comparative study on the advancement of text steganography techniques in digital media | |
| Kataria et al. | ECR (encryption with cover text and reordering) based text steganography | |
| Ramakrishnan et al. | Text steganography: a novel character‐level embedding algorithm using font attribute | |
| Singh et al. | A survey on text based steganography | |
| Alanazi et al. | Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations | |
| Hanyurwimfura et al. | Text format based relational database watermarking for non-numeric data | |
| Mandal et al. | A new approach of text Steganography based on mathematical model of number system | |
| Changder et al. | Linguistic approach for text steganography through Indian text | |
| Chaudhary et al. | Text steganography based on feature coding method | |
| Khairullah et al. | Steganography in bengali unicode text | |
| Mulunda et al. | Genetic algorithm based model in text steganography | |
| Ba-Alwi et al. | Content authentication of English text via internet using zero watermarking technique and Markov model | |
| Rafat et al. | Secure digital steganography for ASCII text documents | |
| Alsaadi et al. | Text steganography in font color of MS excel sheet | |
| Ghilan et al. | Combined Markov model and zero watermarking techniques to enhance content authentication of english text documents | |
| Gaur et al. | A new PDAC (parallel encryption with digit arithmetic of cover text) based text steganography approach for cloud data security | |
| Zhang et al. | A novel robust text watermarking for word document | |
| CN109800547B (en) | Method for quickly embedding and extracting information for WORD document protection and distribution tracking |