Skip to main content
2013 21st Telecommunications Forum Telfor, TELFOR 2013 - Proceedings of Papers2013, Article number 6716383, Pages 928-9312013 21st Telecommunications Forum Telfor, TELFOR 2013; Belgrade; Serbia; 26 November 2013 through 28 November 2013; Category numberCFP1398P-CDR; Code 102720

Application steganography methods of replacement and insertion technique(Conference Paper)

[Primj ena steganografskih metoda tehnil(om zamj ene i ubacivanja]

  • Cajic, M.,
  • Veinovic, M.,
  • Brkic, B.,
  • Jankovic, Z.
  Save all to author list
  • aSveti Sava, Preobraienj ska bb, Rogatica, Bosnia and Herzegovina
  • bUniverzitet Singidunum, Bulevar Zorana Dindica, Novi-Beograd, Serbia
  • cZavod Za Zastitu Zivotne Sredine RS, Kralj a Alfonsa, Banj a Luka, Bosnia and Herzegovina
  • dOpstina Rogatica, Srpske Sloge bb, Rogatica, Bosnia and Herzegovina

Abstract

In this paper, is analysis steganographic method of dealing with technology replacement and insertion in a text. By applying certain methods steganography in the original text obtained steganography processed data carrier called stego-text. Depending on the amount of the replaced plaintext in certain stego-text may be certain variations which are manifested in the differences in size and quality from the original text. As an example are discussed steganographic substitution method in the HTML source and the White space technology. The new groundbreaking method is a propos that replacing the text in the Cyrillic alphabet, called Cyrillic methods. The analysis of the above mentioned methods and recommendations for its use is given. Based on the results given in conclusion in the end of the work. © 2013 IEEE.

Indexed keywords

Engineering uncontrolled termsData carriersHTML sourcesPlaintextSubstitution methodWhite space
Engineering main heading:Steganography
  • ISBN: 978-147991419-7
  • Source Type: Conference Proceeding
  • Original language: Bosnian
  • DOI: 10.1109/TELFOR.2013.6716383
  • Document Type: Conference Paper
  • Sponsors: "TELEKOM SRBIJA" a.d.,ERICSSON,et al.,HUAWEI,University of Belgrade, ETF - Schooll of Electrical Engineering,VLATACOM d.o.o.
  • Publisher: IEEE Computer Society


© Copyright 2017 Elsevier B.V., All rights reserved.

Cited by 1 document

Harba, E.S. , Harba, H.S. , Abdulmunem, I.A.
Improving security of the crypto-stego approach using time sequence dictionary and spacing modification techniques
(2021) Iraqi Journal of Science
View details of this citation
{"topic":{"name":"Noise-to-Signal Ratio; Wavelet Transforms; Steganography","id":40081,"uri":"Topic/40081","prominencePercentile":72.65638,"prominencePercentileString":"72.656","overallScholarlyOutput":0},"dig":"fa6e3c9f0f42c821f3ffc4027c53f186afecdd8c7b569b1c030fcf1dc4422bd8"}

SciVal Topic Prominence

Topic:
Prominence percentile: