UUM Electronic Theses and Dissertation
UUM ETD | Universiti Utara Malaysian Electronic Theses and Dissertation
FAQs | Feedback | Search Tips | Sitemap

Improving stego key using extended-1 and extended-2 techniques of feature coding method in text steganography

Utama, Sunariya (2024) Improving stego key using extended-1 and extended-2 techniques of feature coding method in text steganography. Doctoral thesis, Universiti Utara Malaysia.

[thumbnail of Depositpermission_not Allow-s902955.pdf] Text
Depositpermission_not Allow-s902955.pdf
Restricted to Repository staff only

Download (563kB) | Request a copy
[thumbnail of s902955_01.pdf] Text
s902955_01.pdf
Restricted to Repository staff only

Download (21MB) | Request a copy
[thumbnail of s902955_02.pdf] Text
s902955_02.pdf
Restricted to Repository staff only

Download (3MB) | Request a copy

Abstract

This study focuses on implementing steganography in the text domain called text steganography. Many previous researchers utilize a method in text steganography called the feature coding method to conceal the hidden message based on the uniqueness of the letter in the text. It highlights some feature coding methods that are applied alphabet A-Z letters. However, the existences of technique in feature coding method are easily to recognize due the obvious group of letter pattern text in chosen hidden message. Therefore, the objective is to propose the feature coding of text steganography using binary bit representation. It chose specific group letter for the stego key that begins with identifying the scheme of this technique. Subsequently, this study develops an extension technique that adapts the existing techniques of feature coding method. The proposed extended technique consists of Extended-1 and Extended-2 techniques of feature coding method. It compares the existing and extended techniques feature coding that is evaluated using some parameters to assess performance of technique. The experimental results show that the Extended-1 technique has the highest capacity ratio performance, with 100% recall rate, 46.15%
F-measure rate, and 30% precision and accuracy rates. Meanwhile, the Extended-2 technique exhibits the highest robustness and security performance, achieving 100% performance for precision, recall, accuracy, and F-measure rates. The output of this study generates the extended technique in feature coding that is expected to contribute to the improvement of text steganography. For future work, the technique's utilization of feature coding method in artificial intelligence tools to enhance information security and also as a current trend in the IT field.

Item Type: Thesis (Doctoral)
Supervisor : Din, Roshidi
Item ID: 11489
Uncontrolled Keywords: Information security, Natural language steganography, Feature coding, Verification and validation.
Subjects: L Education > L Education (General)
T Technology > T Technology (General)
Divisions: Awang Had Salleh Graduate School of Arts & Sciences
Date Deposited: 06 Jan 2025 04:03
Last Modified: 06 Jan 2025 04:03
Department: Awang Had Salleh Graduates School of Arts & Sciences
Name: Din, Roshidi
URI: https://etd.uum.edu.my/id/eprint/11489

Actions (login required)

View Item
View Item