Cryptologia
IBM Systems Journal
Building natural language generation systems
Building natural language generation systems
The Theory and Practice of Discourse Parsing and Summarization
The Theory and Practice of Discourse Parsing and Summarization
Advances in Automatic Text Summarization
Advances in Automatic Text Summarization
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Plausible Deniability Using Automated Linguistic Stegonagraphy
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Proceedings of the First International Workshop on Information Hiding
Hiding Data in the OSI Network Model
Proceedings of the First International Workshop on Information Hiding
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
ISC '01 Proceedings of the 4th International Conference on Information Security
Investigator's Guide to Steganography
Investigator's Guide to Steganography
Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Exploiting Linguistic Features in Lexical Steganography: Design and Proof-of-Concept Implementation
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 06
Proceedings of the 2006 ACM symposium on Applied computing
A New Approach to Persian/Arabic Text Steganography
ICIS-COMSAR '06 Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Automatic summarising: The state of the art
Information Processing and Management: an International Journal
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
Graphstega: Graph Steganography Methodology
Journal of Digital Forensic Practice
Nostega: A Novel Noiseless Steganography Paradigm
Journal of Digital Forensic Practice
Listega: list-based steganography methodology
International Journal of Information Security
Nostega: a novel noiseless steganography paradigm
Nostega: a novel noiseless steganography paradigm
Content-aware steganography: about lazy prisoners and narrow-minded wardens
IH'06 Proceedings of the 8th international conference on Information hiding
A method of linguistic steganography based on collocationally-verified synonymy
IH'04 Proceedings of the 6th international conference on Information Hiding
Translation-based steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
Is image steganography natural?
IEEE Transactions on Image Processing
Headstega: e-mail-headers-based steganography methodology
International Journal of Electronic Security and Digital Forensics
Sumstega: summarisation-based steganography methodology
International Journal of Information and Computer Security
Edustega: an Education-Centric Steganography methodology
International Journal of Security and Networks
Steganographic manipulations with elliptic curve cryptography
International Journal of Electronic Security and Digital Forensics
Jokestega: automatic joke generation-based steganography methodology
International Journal of Security and Networks
Hi-index | 0.00 |
Contemporary steganography approaches suffer from many serious deficiencies; generally, they attempt to hide data as detectable and suspicious noise in a cover that is assumed to look innocent. In addition, steganography approaches found in literature have focused on how to conceal a message and not on how to camouflage its transmittal. This paper presents a comprehensive survey that focuses mainly on, but not limited to, computational linguistics aspects of steganography and it is organised as follows: Section 1 concisely details the fundamental concepts related to steganography, summarises the current state of the research, and highlights the technical concerns. Then, it briefly describes the modern steganography, namely noiseless steganography (Nostega). Section 2 discusses the contemporary steganography and Nostega paradigm (the modern steganography). Section 3 demonstrates Nostega-based methodologies. Section 4 presents a brief overview of steganalysis. Section 5 concludes the survey and highlights directions for future research.