DSpace logo

Please use this identifier to cite or link to this item: http://142.54.178.187:9060/xmlui/handle/123456789/902
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAdinugraha, Raka-
dc.contributor.authorPurboyo, Tito Waluyo-
dc.contributor.authorSaputra, Randy Erfa-
dc.date.accessioned2019-11-05T09:40:06Z-
dc.date.available2019-11-05T09:40:06Z-
dc.date.issued2019-10-01-
dc.identifier.issn2415-­0584-
dc.identifier.urihttp://142.54.178.187:9060/xmlui/handle/123456789/902-
dc.description.abstractSteganography is the art of hiding data within another data. Is a useful technique for hiding data such as image, audio, text etc behind cover files? There are exists various techniques for text Steganography, and all of them have their own respective strong and weak points. For each text Steganography used, they have different requirements and rules on how they applied. Many Text Steganography techniques are proposed, all of them have something in common that was to increase embedding rate of the secret data within the cover files and to rises suspicion as little as possible from an unintended observer. Steganography is a promising technique as a supplement to Cryptography, because the chiper text will certainly raise suspicion because it forms, and there is where Steganography comes in to hide those encrypted message to some cover files thus reducing risk the secret message get revealed. This paper provides a general overview and a brief idea of Text Steganography techniques.en_US
dc.language.isoen_USen_US
dc.publisherAsian Research Publishing Networken_US
dc.subjectEngineering and Technologyen_US
dc.subjectSteganographyen_US
dc.subjectHidingen_US
dc.subjectTexten_US
dc.subjectCoveren_US
dc.subjectSuspicionen_US
dc.titleA PERSPECTIVE ON TEXT HIDING METHODSen_US
dc.typeArticleen_US
Appears in Collections:Journals

Files in This Item:
File Description SizeFormat 
jeas_1019_7951.htm146 BHTMLView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.