{"title":"基于隐写术的文本隐藏层平面创建新模型","authors":"Shalaw Mshir, A. Varol","doi":"10.1109/ISDFS.2019.8757498","DOIUrl":null,"url":null,"abstract":"Steganography is the art and science of hiding messages in a secret way such that only the sender and receiver know. This allows one party to communicate with another without a third party knowing that the connection is taking place. Here, the data is hidden inside a safe “cover”, where even if a third party can capture the cover, there will be nothing to show what data is hidden inside. Meanwhile, the cover can be an image, sound, video or document. Steganography has two primary aspects: security - whether the hidden data is perceptible by either a person or a computer; and capacity - how much data can be hidden in a given cover file. Because the system works within a spatial domain, it can hide a large amount of information, while embedding and extraction processes require less time in terms of execution than methods using transform domains. This paper explains how to use steganography through a modern technique with a practical understanding.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A New Model for Creating Layer Planes Using Steganography for Text Hiding\",\"authors\":\"Shalaw Mshir, A. Varol\",\"doi\":\"10.1109/ISDFS.2019.8757498\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Steganography is the art and science of hiding messages in a secret way such that only the sender and receiver know. This allows one party to communicate with another without a third party knowing that the connection is taking place. Here, the data is hidden inside a safe “cover”, where even if a third party can capture the cover, there will be nothing to show what data is hidden inside. Meanwhile, the cover can be an image, sound, video or document. Steganography has two primary aspects: security - whether the hidden data is perceptible by either a person or a computer; and capacity - how much data can be hidden in a given cover file. Because the system works within a spatial domain, it can hide a large amount of information, while embedding and extraction processes require less time in terms of execution than methods using transform domains. This paper explains how to use steganography through a modern technique with a practical understanding.\",\"PeriodicalId\":247412,\"journal\":{\"name\":\"2019 7th International Symposium on Digital Forensics and Security (ISDFS)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 7th International Symposium on Digital Forensics and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS.2019.8757498\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS.2019.8757498","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A New Model for Creating Layer Planes Using Steganography for Text Hiding
Steganography is the art and science of hiding messages in a secret way such that only the sender and receiver know. This allows one party to communicate with another without a third party knowing that the connection is taking place. Here, the data is hidden inside a safe “cover”, where even if a third party can capture the cover, there will be nothing to show what data is hidden inside. Meanwhile, the cover can be an image, sound, video or document. Steganography has two primary aspects: security - whether the hidden data is perceptible by either a person or a computer; and capacity - how much data can be hidden in a given cover file. Because the system works within a spatial domain, it can hide a large amount of information, while embedding and extraction processes require less time in terms of execution than methods using transform domains. This paper explains how to use steganography through a modern technique with a practical understanding.