Cryptologia
IBM Systems Journal
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Plausible Deniability Using Automated Linguistic Stegonagraphy
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Proceedings of the First International Workshop on Information Hiding
Hiding Data in the OSI Network Model
Proceedings of the First International Workshop on Information Hiding
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
ISC '01 Proceedings of the 4th International Conference on Information Security
Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Exploiting Linguistic Features in Lexical Steganography: Design and Proof-of-Concept Implementation
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 06
Proceedings of the 2006 ACM symposium on Applied computing
A New Approach to Persian/Arabic Text Steganography
ICIS-COMSAR '06 Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
Graphstega: Graph Steganography Methodology
Journal of Digital Forensic Practice
Nostega: A Novel Noiseless Steganography Paradigm
Journal of Digital Forensic Practice
Listega: list-based steganography methodology
International Journal of Information Security
Nostega: a novel noiseless steganography paradigm
Nostega: a novel noiseless steganography paradigm
Content-aware steganography: about lazy prisoners and narrow-minded wardens
IH'06 Proceedings of the 8th international conference on Information hiding
Comprehensive linguistic steganography survey
International Journal of Information and Computer Security
A method of linguistic steganography based on collocationally-verified synonymy
IH'04 Proceedings of the 6th international conference on Information Hiding
Translation-based steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
Is image steganography natural?
IEEE Transactions on Image Processing
Jokestega: automatic joke generation-based steganography methodology
International Journal of Security and Networks
Hi-index | 0.00 |
This paper presents a novel Education-Centric Steganography Methodology (Edustega) that takes advantages of such text to conceal data. Edustega is based on Nostega paradigm, which implies that it neither hides data in a noise (errors) nor produces noise. Such materials, e.g., questions, answers, exams, examples, puzzles, competitions, etc., have an adequate room for concealing data where the observed bitrate by the experimental results of the current implementation is superior to all contemporary linguistic steganography approaches. Edustega can be applied to all languages. The presented implementation, validation, and experimental results confirmed that Edustega methodology is capable of achieving the steganographical goal.