Comprehensive linguistic steganography survey Online publication date: Mon, 23-Aug-2010
by Abdelrahman Desoky
International Journal of Information and Computer Security (IJICS), Vol. 4, No. 2, 2010
Abstract: Contemporary steganography approaches suffer from many serious deficiencies; generally, they attempt to hide data as detectable and suspicious noise in a cover that is assumed to look innocent. In addition, steganography approaches found in literature have focused on how to conceal a message and not on how to camouflage its transmittal. This paper presents a comprehensive survey that focuses mainly on, but not limited to, computational linguistics aspects of steganography and it is organised as follows: Section 1 concisely details the fundamental concepts related to steganography, summarises the current state of the research, and highlights the technical concerns. Then, it briefly describes the modern steganography, namely noiseless steganography (Nostega). Section 2 discusses the contemporary steganography and Nostega paradigm (the modern steganography). Section 3 demonstrates Nostega-based methodologies. Section 4 presents a brief overview of steganalysis. Section 5 concludes the survey and highlights directions for future research.
Online publication date: Mon, 23-Aug-2010
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information and Computer Security (IJICS):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com