Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis
Modern text hiding is an intelligent programming technique which embeds a secret message/watermark into a cover text message/file in a hidden way to protect confidential information. Recently, text hiding in the form of watermarking and steganography has found broad applications in, for instance, co...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-04-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/21/4/355 |
_version_ | 1828115465998696448 |
---|---|
author | Milad Taleby Ahvanooey Qianmu Li Jun Hou Ahmed Raza Rajput Yini Chen |
author_facet | Milad Taleby Ahvanooey Qianmu Li Jun Hou Ahmed Raza Rajput Yini Chen |
author_sort | Milad Taleby Ahvanooey |
collection | DOAJ |
description | Modern text hiding is an intelligent programming technique which embeds a secret message/watermark into a cover text message/file in a hidden way to protect confidential information. Recently, text hiding in the form of watermarking and steganography has found broad applications in, for instance, covert communication, copyright protection, content authentication, etc. In contrast to text hiding, text steganalysis is the process and science of identifying whether a given carrier text file/message has hidden information in it, and, if possible, extracting/detecting the embedded hidden information. This paper presents an overview of state of the art of the text hiding area, and provides a comparative analysis of recent techniques, especially those focused on marking structural characteristics of digital text message/file to hide secret bits. Also, we discuss different types of attacks and their effects to highlight the pros and cons of the recently introduced approaches. Finally, we recommend some directions and guidelines for future works. |
first_indexed | 2024-04-11T12:40:44Z |
format | Article |
id | doaj.art-2d395c907b57411da9c833c928dcc95c |
institution | Directory Open Access Journal |
issn | 1099-4300 |
language | English |
last_indexed | 2024-04-11T12:40:44Z |
publishDate | 2019-04-01 |
publisher | MDPI AG |
record_format | Article |
series | Entropy |
spelling | doaj.art-2d395c907b57411da9c833c928dcc95c2022-12-22T04:23:30ZengMDPI AGEntropy1099-43002019-04-0121435510.3390/e21040355e21040355Modern Text Hiding, Text Steganalysis, and Applications: A Comparative AnalysisMilad Taleby Ahvanooey0Qianmu Li1Jun Hou2Ahmed Raza Rajput3Yini Chen4School of Computer Science and Engineering, Nanjing University of Science and Technology, P.O. Box 210094, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, P.O. Box 210094, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, P.O. Box 210094, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, P.O. Box 210094, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, P.O. Box 210094, Nanjing, ChinaModern text hiding is an intelligent programming technique which embeds a secret message/watermark into a cover text message/file in a hidden way to protect confidential information. Recently, text hiding in the form of watermarking and steganography has found broad applications in, for instance, covert communication, copyright protection, content authentication, etc. In contrast to text hiding, text steganalysis is the process and science of identifying whether a given carrier text file/message has hidden information in it, and, if possible, extracting/detecting the embedded hidden information. This paper presents an overview of state of the art of the text hiding area, and provides a comparative analysis of recent techniques, especially those focused on marking structural characteristics of digital text message/file to hide secret bits. Also, we discuss different types of attacks and their effects to highlight the pros and cons of the recently introduced approaches. Finally, we recommend some directions and guidelines for future works.https://www.mdpi.com/1099-4300/21/4/355modern text hidingtext steganographytext steganalysiscovert communication |
spellingShingle | Milad Taleby Ahvanooey Qianmu Li Jun Hou Ahmed Raza Rajput Yini Chen Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis Entropy modern text hiding text steganography text steganalysis covert communication |
title | Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis |
title_full | Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis |
title_fullStr | Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis |
title_full_unstemmed | Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis |
title_short | Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis |
title_sort | modern text hiding text steganalysis and applications a comparative analysis |
topic | modern text hiding text steganography text steganalysis covert communication |
url | https://www.mdpi.com/1099-4300/21/4/355 |
work_keys_str_mv | AT miladtalebyahvanooey moderntexthidingtextsteganalysisandapplicationsacomparativeanalysis AT qianmuli moderntexthidingtextsteganalysisandapplicationsacomparativeanalysis AT junhou moderntexthidingtextsteganalysisandapplicationsacomparativeanalysis AT ahmedrazarajput moderntexthidingtextsteganalysisandapplicationsacomparativeanalysis AT yinichen moderntexthidingtextsteganalysisandapplicationsacomparativeanalysis |