Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Research Article
Investigate the Capability of Applying Hidden Data in Text File: An Overview

A.A. Zaidan, B.B. Zaidan, Ali K. Al-Fraja and Hamid A. Jalab

Journal of Applied Sciences, 2010, 10(17), 1916-1922.

Abstract

The aim of this study is to investigate the methods of steganography using the text file as a cover carrier. The hiding data or Steganography is the art of protecting the information by embedding data in medium carrier, for instants this study illustrates historically this art. The steganography technique has been used mainly to hide secret data within multimedia files and one of used files to hide secret data is the text files. In this study, we have proposed the steganography methods using the text files as a review. The study restricts the weak points of this art by hiding information in text file. As a result of this study, the text based steganography has been discussed and the advantages and disadvantages of using the text file as a cover carrier for steganography has been proposed.

ASCI-ID: 35-3590

Cited References Fulltext

Related Articles


A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm

Journal of Applied Sciences, 2010, 10(1), 59-64.

On the Capacity and Security of Steganography Approaches: An Overview

Journal of Applied Sciences, 2010, 10(16), 1825-1833.

Hiding Data in Video File: An Overview

Journal of Applied Sciences, 2010, 10(15), 1644-1649.

On the Differences between Hiding Information and Cryptography Techniques: An Overview

Journal of Applied Sciences, 2010, 10(15), 1650-1655.

A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm

Journal of Applied Sciences, 2010, 10(1), 59-64.

On the Capacity and Security of Steganography Approaches: An Overview

Journal of Applied Sciences, 2010, 10(16), 1825-1833.

On the Differences between Hiding Information and Cryptography Techniques: An Overview

Journal of Applied Sciences, 2010, 10(15), 1650-1655.

Hiding Data in Video File: An Overview

Journal of Applied Sciences, 2010, 10(15), 1644-1649.

An Overview on Hiding Information Technique in Images

Journal of Applied Sciences, 2010, 10(18), 2094-2100.

Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA

Journal of Applied Sciences, 2012, 12(3), 201-210.

Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego

Journal of Applied Sciences, 2012, 12(5), 428-439.

Sub Carriers Carry Secret: An Absolute Stego Approach

Journal of Applied Sciences, 2014, 14(15), 1728-1735.

Coded Crypted Converted Hiding (C3H)-A Stego Channel

Journal of Applied Sciences, 2014, 14(16), 1786-1797.

Adaptive Data Hiding Based on Visual Cryptography

Journal of Applied Sciences, 2014, 14(15), 1674-1688.

Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity

Journal of Applied Sciences, 2014, 14(16), 1798-1808.

Multi (Carrier+Modulator) Adaptive System-an Anti Fading Stego Approach

Journal of Applied Sciences, 2014, 14(16), 1836-1843.

Cited By


Secure Topology for Electronic Medical Record Transmissions

International Journal of Pharmacology, 2010, 6(6), 954. DOI: 10.3923/ijp.2010.954.958

Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert Concerns

International Journal of Pharmacology, 2011, 7(3), 382. DOI: 10.3923/ijp.2011.382.387

High Watermarking Capacity Based on Spatial Domain Technique

Information Technology Journal, 2011, 10(7), 1367. DOI: 10.3923/itj.2011.1367.1373

A Review on Multimedia Communications Cryptography

Research Journal of Information Technology, 2011, 3(3), 146. DOI: 10.3923/rjit.2011.146.152

Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis

Health and Technology, 2018, (), . DOI: 10.1007/s12553-018-0278-7

Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review

Journal of Medical Systems, 2019, 43(2), . DOI: 10.1007/s10916-018-1149-5

Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review

Journal of Medical Systems, 2019, 43(3), . DOI: 10.1007/s10916-019-1158-z

Based Medical Systems for Patient’s Authentication: Towards a New Verification Secure Framework Using CIA Standard

Journal of Medical Systems, 2019, 43(7), . DOI: 10.1007/s10916-019-1264-y

Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication

Computer Standards & Interfaces, 2019, (), 103343. DOI: 10.1016/j.csi.2019.04.002

New Method of Image Steganography Based on Particle Swarm Optimization Algorithm in Spatial Domain for High Embedding Capacity

IEEE Access, 2019, 7(), 168994. DOI: 10.1109/ACCESS.2019.2949622

Finger Vein Biometrics: Taxonomy Analysis, Open Challenges, Future Directions, and Recommended Solution for Decentralised Network Architectures

IEEE Access, 2020, 8(), 9821. DOI: 10.1109/ACCESS.2020.2964788

A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization

Security and Communication Networks, 2021, 2021(), 1. DOI: 10.1155/2021/6679284

PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture

Multimedia Tools and Applications, 2021, (), . DOI: 10.1007/s11042-020-10284-y