ISJ Theoretical & Applied Science

 

 

Information about the scientific journal

Submit an article to the journal

Requirements to the article

Section

Indexing

Journal archive

Tracing of postal items

Cooperation

Editorial Board

 

 

www.T-Science.org       p-ISSN 2308-4944 (print)       e-ISSN 2409-0085 (online)
SOI: 1.1/TAS         DOI: 10.15863/TAS

Journal Archive

ISJ Theoretical & Applied Science 07(87) 2020

Philadelphia, USA

* Scientific Article * Impact Factor 6.630


Ganiev, A. A., & Mavlonov, O. N.

The analysis of text steganography methods.

Full Article: PDF

Scientific Object Identifier: http://s-o-i.org/1.1/TAS-07-87-23

DOI: https://dx.doi.org/10.15863/TAS.2020.07.87.23

Language: English

Citation: Ganiev, A. A., & Mavlonov, O. N. (2020). The analysis of text steganography methods. ISJ Theoretical & Applied Science, 07 (87), 85-88. Soi: http://s-o-i.org/1.1/TAS-07-87-23 Doi: https://dx.doi.org/10.15863/TAS.2020.07.87.23

Pages: 85-88

Published: 30.07.2020

Abstract: Today, in any area of our life, any type of data (text, image, audio, video, etc.) can be stored and transmitted at high speed. However, they are easily accessed illegally, forged, and copied. For this reason, the problem of information security has become more important with the development of the computer. One of the grounds discussed in the field of information security is the exchange of information through mass media using steganography methods. In this article, we discuss various approaches to text steganography. There are several methods of text steganography, each type has its special function, and they all have their strengths and weaknesses. We analyze some of the main approaches of text steganography and compare them depending on their effectiveness based on advantages and disadvantages.

Key words: steganography, ciphertext, encrypt, hash, cover object, attackers, cryptography, stegotext.


 

 

 

 

 

 

E-mail:         T-Science@mail.ru

© «Theoretical &Applied Science»                      2013 г.