Full Article: PDF
Scientific Object Identifier: http://s-o-i.org/1.1/TAS-07-87-23
DOI: https://dx.doi.org/10.15863/TAS.2020.07.87.23
Language: English
Citation: Ganiev, A. A., & Mavlonov, O. N. (2020). The analysis of text steganography methods. ISJ Theoretical & Applied Science, 07 (87), 85-88. Soi: http://s-o-i.org/1.1/TAS-07-87-23 Doi: https://dx.doi.org/10.15863/TAS.2020.07.87.23 |
Pages: 85-88
Published: 30.07.2020
Abstract: Today, in any area of our life, any type of data (text, image, audio, video, etc.) can be stored and transmitted at high speed. However, they are easily accessed illegally, forged, and copied. For this reason, the problem of information security has become more important with the development of the computer. One of the grounds discussed in the field of information security is the exchange of information through mass media using steganography methods. In this article, we discuss various approaches to text steganography. There are several methods of text steganography, each type has its special function, and they all have their strengths and weaknesses. We analyze some of the main approaches of text steganography and compare them depending on their effectiveness based on advantages and disadvantages.
Key words: steganography, ciphertext, encrypt, hash, cover object, attackers, cryptography, stegotext.
|