101. Analysis review on feature-based and word-rule based techniques in text steganography
- Author
-
Roshidi Din and Farah Qasim Ahmed Alyousuf
- Subjects
Control and Optimization ,Computer Networks and Communications ,Computer science ,Feature-based ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Rule-based system ,Data_CODINGANDINFORMATIONTHEORY ,computer.software_genre ,Word-rule based ,Hardware and Architecture ,Control and Systems Engineering ,Text steganography ,Robustness (computer science) ,Computer Science (miscellaneous) ,Feature based ,Embedding ,Data mining ,Electrical and Electronic Engineering ,Instrumentation ,computer ,Information Systems - Abstract
This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation of the techniques used in text steganography. This paper aims to identify the main techniques of text steganography, which are feature-based, and word-rule based, to recognize the various techniques used with them. As a result, the primary technique used in the text steganography was feature-based technique due to its simplicity and secured. Meanwhile, the common parameter metrics utilized in text steganography were security, capacity, robustness, and embedding time. Future efforts are suggested to focus on the methods used in text steganography.
- Published
- 2020