scholarly journals A Survey of Text Steganography Methods

Author(s):  
Vivek Sharma S ◽  
Monika Raj ◽  
Swathi S

Phishing is that the most typical and most dangerous attack among cybercrimes. The aim of these attacks is to steal the data that’s utilized by people and organizations to perform transactions or any vital info. The goal of this is often to perform an Extreme Learning Sending encrypted messages frequently will draw the attention of third parties, i.e. hackers, perhaps causing attempts to break and reveal the original messages. In a digital world, steganography is introduced to hide the existence of the communication by concealing a secret message inside another unsuspicious message. This paper presents an overview of text steganography and a brief history of steganography along with various existing text-based steganography techniques.

Author(s):  
M.Grace Vennice ◽  
M. Swapna ◽  
MD.Ahmad Ali ◽  
T.Dharma Reddy

The Often Distribution of encrypted messages will depict the concentration of third parties. The attempts can be made to break and expose the actual messages by the hackers and cracker crackers. To conceal the subsistence of message steganography is introduced by hiding a secret message inside another credulous message.Steganography along with cryptograph y is used and offers suitable amount of privacy and security over the communication cha channel. nnel. In this paper along with various existing text text-based steganography techniques, an overview of text steganography and a concise history of steganography can be presented. The problems present in the text steganography and issues with existing solution solutionss are highlighted. In information hiding, a novel approach is proposed by using inter-word word spacing and inter inter-paragraph paragraph spacing as a hybrid method. Based on the length of the secret message, the proposed method provides dynamic generated stego stego-text with six ix options of maximum capacity. The considerable drawbacks of every existing method and how our new approach might be recommended as a solution can be analyzed in this paper.


2014 ◽  
Vol 13 (7) ◽  
pp. 4675-4682
Author(s):  
Atefeh Danesh Moghadam ◽  
Alireza Alagha

In the advent of information era, not only digital world is going to expand its territories, it is going to penetrate into the traditional notions about the meaning of the words and also valorize new concepts. According to Oxford Dictionary, the word heritage is defined: The history, tradition and qualities that a country or society has had for many years and that are considered an important part of its character. In order to present how emerging patterns, as the consequences of technology development, are going to be considered as the new concept of heritage, we follow four steps. In the first step, we present the convergence of Information, Communication and Technology (ICT) and a concise history of its convergence. In the second step, we argue how convergence has culminated in emerging patterns and also has made changes in digital world. In the third step, the importance of users behaviors and its mining is surveyed. Finally, in the fourth step; we illustrate User Generated Contents (UGC) as the most prominent users behaviors in digital world.


2021 ◽  
Vol 11 (15) ◽  
pp. 6851
Author(s):  
Reema Thabit ◽  
Nur Izura Udzir ◽  
Sharifah Md Yasin ◽  
Aziah Asmawi ◽  
Nuur Alifah Roslan ◽  
...  

Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. As text uses low bandwidth, it is commonly used by Internet users in their daily activities, resulting a vast amount of text messages sent daily as social media posts and documents. Accordingly, text is the ideal object to be used in steganography, since hiding a secret message in a text makes it difficult for the attacker to detect the hidden message among the massive text content on the Internet. Language’s characteristics are utilized in text steganography. Despite the richness of the Arabic language in linguistic characteristics, only a few studies have been conducted in Arabic text steganography. To draw further attention to Arabic text steganography prospects, this paper reviews the classifications of these methods from its inception. For analysis, this paper presents a comprehensive study based on the key evaluation criteria (i.e., capacity, invisibility, robustness, and security). It opens new areas for further research based on the trends in this field.


Symmetry ◽  
2022 ◽  
Vol 14 (1) ◽  
pp. 111
Author(s):  
Mingliang Zhang ◽  
Zhenyu Li ◽  
Pei Zhang ◽  
Yi Zhang ◽  
Xiangyang Luo

Behavioral steganography is a method used to achieve covert communication based on the sender’s behaviors. It has attracted a great deal of attention due to its robustness and wide application scenarios. Current behavioral steganographic methods are still difficult to apply in practice because of their limited embedding capacity. To this end, this paper proposes a novel high-capacity behavioral steganographic method combining timestamp modulation and carrier selection based on social networks. It is a steganographic method where the embedding process and the extraction process are symmetric. When sending a secret message, the method first maps the secret message to a set of high-frequency keywords and divides them into keyword subsets. Then, the posts containing the keyword subsets are retrieved on social networks. Next, the positions of the keywords in the posts are modulated as the timestamps. Finally, the stego behaviors applied to the retrieved posts are generated. This method does not modify the content of the carrier, which ensures the naturalness of the posts. Compared with typical behavioral steganographic methods, the embedding capacity of the proposed method is 29.23∼51.47 times higher than that of others. Compared to generative text steganography, the embedding capacity is improved by 16.26∼23.94%.


2019 ◽  
Vol 5 (02) ◽  
pp. 159
Author(s):  
Jokhanan Kristiyono ◽  
Hernani Sirikit

<p>ABSTRACT</p><p>This study aims to find out how factual and digital reality are depicted in film.Castells’ theory on new media is taken for the base theory, subjectivity-identity and power and knowledge by Foucault. Narrative analysis by Lacey is applied to seek answer for the research problem. The advancement of Communication Technology has enabled human beings to have freedom in imagination and make it real. Digital technology and virtual realm are enriched with emerging faked realities and identities. Film, becomes a platform for practising this kind of freedom, making fantasy feels like reality. Film Ready Player One? directed by Steven Spielberg depicts real and virtual world. This study aims to elaborate how real life and digital life are narrated and described in this film. A new identity created in The OASIS,the digital world that a place where mankind escape from reality. Units to be analysed in eight structures of analysis are story, plot, and character. Concludesis factual reality and digital reality are described well in this film, it even tends to hyper-reality. Moreover, conflict in digital world and in the future (2045) are still the same with problems in the history of mankind.</p><p>Keywords; Film; Digital reality; Identities; Narrative.</p><p>ABSTRAK</p><p>Penelitian ini bertujuan mengetahui bagaimana realitas faktual dan realitas digital digambarkan dalam film. Menggunakan teori new media Castells, subjektivitas dan identitas serta power dan knowledge Foucault. Penelitian film ini menggunakan pendekatan deskriptif kualitatif, dengan metode Analisa Naratif Film (Lacey, 2017). Kemajuan teknologi informasi dan komunikasi membuat manusia memiliki keleluasaan dalam berimajinasi dan merealisasikannya. Teknologi digital dan alam virtual semakin diperkaya dengan munculnya realitas dan identitas semu. Film, sebagai salah satu medium komunikasi massa, merupakan wadah kebebasan berimajinasi. Film Ready Player One?.Film besutan sutradara Steven Spielberg menggambarkan pergesekan antara dunia nyata dan dunia digital. Film ini menunjukkan kehidupan masyarakat moderen pada tahun 2045, dengan adanya perkembangan teknologi yang luar biasa. Suatu piranti yang mengubah manusia menjadi sangat tergantung dengan teknologi. Teknologi informasi dan komunikasi yang menciptakan dunia baru yaitu dunia digital. OASIS, dunia tempat pelarian manusia modern dan menciptakan identitas baru yaitu identitas virtual. Masyarakat informasi yang menciptakan realitas digital. Unit analisis story, plot, dan karakter dianalisis secara naratif dengan delapan struktur. Hasil analisis memberikan jawaban bahwa realitas nyata dan realitas digital digambarkan secara baik dalam film ini, bahkan cenderung berlebihan (hyper-reality). Selain itu, konflik di dunia digital di tahun 2045 tetap sama dengan konflik dalam sejarah manusia.</p><p>Kata Kunci; Film; Digital Reality; Identitas; Naratif.</p>


Author(s):  
Evrim Celtek

The rapid growth in the use of smart phones and respective mobile applications has created new ways for the tourism industry to market the services to customers. The growing use of smart phones is driving the mobile applications market to be one of the fastest growing media outlets in the history of consumer technology. Augmented reality, or AR, has become one of the new advertising and marketing tool. Many brands use AR to attract customers and to increase customer engagement. AR allows smart phone and tablet computer users to point their phone or tablet cameras at certain objects—be they print advertisement or even coffee cups—that trigger a 3D video. Augmented reality gives businesses opportunity to unexpectedly integrate the digital world with the real world. This chapter presents the profile of AR applications and AR advertisements in the tourism industry.


2019 ◽  
pp. 235-260
Author(s):  
Julian Voloj ◽  
Anthony Bak Buccitelli

This chapter talks about San Francisco-based company Linden Lab who launched Second Life (SL), which is described as an online digital world that is built, shaped, and owned by its participants. It discloses how SL was seen as the next big internet phenomenon and was the focus of attention by investors and media alike for a short period of time. It also explains SL's complex relationship with 'real life', which is defined both by the encoded parameters of the virtual space and by the social and cultural practices of the people who use the platform. The chapter discusses SL as a broad platform that encompassed many cultural constructions and developed a rich and diverse set of religious cultures. It recounts how dozens of Jewish sites across the grid emerged and were created both by individual users and by offline institutions that established SL presences.


Author(s):  
Rebecca J. Bennett ◽  
Shelly Marasi ◽  
Lauren Locklear

The history of workplace deviance research has evolved from a focus on singular behaviors, such as theft or withdrawal in the 1970s and 1980s, to the broader focus on a range of behaviors in the 21st century. This more inclusive cluster of related “dark side” behaviors is made up of voluntary behaviors that violate significant organizational norms and in so doing threaten the well-being of an organization, its members, or both. Examples of behaviors that fall in this domain are employee theft and sabotage of organizational goods, services, data, customer lists, materials, working slow, calling in sick when you are not, bullying, harassment, discrimination, and gossip. Workplace deviance can be targeted at other individuals in the organization (coworkers, supervisors, subordinates) or at the organization itself, or both. Typically the actor’s perspective is considered, but other relevant views of the behavior include the supervisor/the organization, peers, customers, or other third parties. Many causes have been studied as sources of deviant workplace behaviors, for example personality characteristics such as neuroticism or low conscientiousness, modeling others’ behavior, experiences of injustice, uncertainty, lack of control or feelings of anger, frustration, and dissatisfaction. Nowadays, some researchers are returning to a focus on individual behaviors, or smaller clusters of behaviors such as sexual misconduct, gossip, and even constructive deviance, and the outcomes of workplace deviance on actors, targets, and observers are being investigated.


2009 ◽  
Vol 14 (2) ◽  
pp. 281-310 ◽  
Author(s):  
Neda Zawahri

AbstractThird parties have been active in assisting adversarial states to navigate their international river disputes. By using the carrot and stick to facilitate compromise, mediators have also participated in the negotiations leading to the signing of treaties over international rivers. Yet, due to the nature of the issue confronting riparian states, the long-term impact of these efforts is likely to be unstable cooperation rather than cooperation. This is still an important contribution, because the absence of mediation efforts may contribute to an environment of conflict. However, since riparian states confront a relationship that involves the need to continuously manage disputes that arise as states develop their international rivers, a mediator may be more effective in facilitating cooperation if it assists developing states with a history of animosity to establish effectively designed river basin commissions and it oversees the implementation of treaties. Participating in the initial years of a treaty's implementation by coordinating the donor community to underwrite projects can minimize the potential disputes riparians confront. An effectively designed river basin commission can assist in facilitating cooperation long after the mediator has departed from the region. To demonstrate this argument, the article draws on the Indus River case, which has lived through four different phases. The Euphrates and Tigris Rivers are used to illustrate the argument's ability to explain other cases.


2020 ◽  
Vol 12 (1) ◽  
pp. 112
Author(s):  
Rahman Indra Kesuma ◽  
Amirul Iqbal

AbstractThe changes in lifestyle of the global society in the era of digital world development have made the smartphone technology penetration to rise continually. This condition can increase business opportunities, especially e-commerce activities that utilize technology and the internet in terms of promotions and transactions. The efficiency and effectiveness is an interesting focus that is discussed in this issue. For example, in services or products searching for a wedding where many customers still feel difficult and need a long time to find the desired things. The existence of a recommendation system also has not been able to help, especially for users who are newly registered to the system. This is because most of them will provide recommendations based on a history of user activity. Therefore, this study applies the content-boosted collaborative filtering (CBCF) method to improve the ability of the recommendation system in providing recommendations for weddings, especially for a new user. The obtained results are then compared with two commonly used methods, content-based recommendations (CB) and collaborative filtering (CF). Based on the experimental results, it can be concluded that CBCF can maintain the quality of good recommendations for long registered users with an accuracy of 84% and also can provide recommendations for new users with an accuracy of 54% which is cannot be solved by CB or CF methods.Key Word: digital businesses, wedding vendors/organizers, recommendation system, content-boosted collaborative filtering  AbstrakPerubahan pola kehidupan masyarakat global pada era perkembangan dunia digital membuat penetrasi dari teknologi telepon pintar terus menaik. Kondisi ini dapat meningkatkan kesempatan bisnis khususnya kegiatan jual beli yang memanfaatkan teknologi dan internet dalam hal promosi dan transaksi. Efisiensi dan efektifitas proses menjadi fokus yang terus menarik dibahas dalam hal ini. Sebagai contoh, pada pencarian layanan atau produk untuk pernikahan yang mana banyak pelanggan masih merasakan kesulitan dan membutuhkan waktu yang lama untuk mencari sesuatu yang diinginkannya. Keberadaan sistem rekomendasi juga belum bisa membantu terlebih bagi pengguna yang baru terdaftar pada sistem. Hal ini dikarenakan kebanyakan sistem akan memberikan rekomendasi berdasarkan rekam jejak aktifitas pengguna. Maka itu, pada penelitian ini diusulkan penerapan metode content-boosted collaborative filtering (CBCF) untuk meningkatkan kemampuan sistem rekomendasi dalam pemberian rekomendasi untuk acara pernikahan, khususnya pada pengguna baru. Hasil yang diperoleh selanjutnya dibandingkan dengan dua metode yang umum digunakan yaitu content based recommendation (CB) dan collaborative filtering (CF). Berdasarkan hasil penelitian yang diperoleh, dapat disimpulkan bahwa CBCF dapat mempertahankan kualitas pemberian rekomendasi yang baik untuk pengguna lama dengan akurasi sebesar 84% serta mampu memberikan rekomendasi untuk pengguna baru dengan akurasi 54% yang mana kondisi ini tidak bisa diselesaikan oleh metode CB ataupun CF.Kata Kunci: bisnis digital, penyedia jasa acara pernikahan, sistem rekomendasi, content-boosted collaborative filtering 


Sign in / Sign up

Export Citation Format

Share Document