Analysis Review of Feature-Based Method in Term of Verification and Validation Performance

Authors

  • Roshidi Din School of Computing UUM College Arts and Sciences, Universiti Utara Malaysia, 06010, Sintok, Kedah, Malaysia.
  • Sunariya Utama School of Computing UUM College Arts and Sciences, Universiti Utara Malaysia, 06010, Sintok, Kedah, Malaysia.

Keywords:

Natural Language Steganography, Text Steganography, Evaluation Performance, Parameter Metric,

Abstract

The categories of information named steganography has become the options of securing hidden message that wouldn’t be detected by intruders or third party. Implementation steganography able to develop in several domains and this paper focuses on text domain of steganography. This paper particularizes the implementation one of the category of steganography in text domain that measures the evaluation performance through verification and validation approaches. It reviews one of the methods in text steganography called feature-based. This method has been established by previous researcher effort that to cover hidden message based on characteristic of letters in the text. This paper identifies the type of measurement that has been used developed as the feature-based method of text steganography. It anticipated the identification of evaluation performance through verification and validation can able to use as procedure the measurement performance in steganography implementation.

References

M. N. Alam, and M. A. Naser, . “Re-evaluating Chain-Code as A Feature Bangla Script”. 2013 International Conference on Electrical Information and Communication Technology (EICT), p. 1-5, 2013.

S.S. Iyer, and K. Laktharia. “New robust and secure alphabet pairing text steganography algorithm”. International Journal of Current Trends in Engineering & Research (IJCTER), vol. 2 no. 7, pp. 15-21, 2016.

M. Y. Elmahi and M. H. Sayed, “Text Steganography Using Compression and Random Number Generators,” vol. 6, no. 6, pp. 259– 263, 2017.

S. Roy and M. Manasmiti “A novel approach to format based steganography”. ICCCS’11, pp. 511-517, 2011.

R.G. Sergeant. An introduction to verification and validation of simulation models. Proceeding of the 2013 Winter Simulation Conference, pp. 321-327, 2014.

Nazir, S., Motla, Y. H., Abbas, T., Khaton A., Jaben, J., Iqra, M., & Bakhtar, K. (2014). A process improvement in requirement verification and validation using ontology. IEEE Systems Journal, 1-8.

W. A. Ghuman and J. Lassig, . Verification requirement for secure reliable cloud computing. 2013 IEEE Third International Conference on Cloud and Green Computing, pp. 143-150, 2013.

M. C. B. Alves D. Drusinsky and J. B. Michael. “End-to-End Formal Specification, Validation, and Verification Process: A Case Study of Space Flight Software”. IEEE Systems Journal, vol. 7 no. 4, 632-641, 2013.

L. B. Rogovchenko, P. Fritzon, A. Garo and A. Tundis. Requirement verification and dependency tracing during simulation in modelica. 2013 8th EUROSIM Congress on Modelling and Simulation, pp. 561- 565, 2013.

L. Xinhua, W. Weida, and L. Wenjian An intelligent methodology for business process model verification. 2007 IEEE International Conference on Control and Automation FrB6-2 Guangzhou, CHINA, pp. 2381-2385, 2007.

Y. S. W. Chen, and P. Hsiung, Y Lan,, Y. Hu, and S. Chen. “Formal modeling and verification for network-on-chip. IEEE Systems Journal, pp. 299-304, 2010.

X. Wu and Z. Yang. “Verification-based interval-passing algorithm for compressed sensing”. IEEE Signal Processing Letters, vol. 20 no. 10, pp. 934-936, 2013.

C. A. Userner, S. Gruttman, T.A. Majchrzak, T.A. and H. Kuchen Computer-supported assessment of software verification proof. International Conference on Educational and Information Technology (ICEIT 2010), pp. 115-121. 2010.

R. Rahmat, N.S. Kamel, and N. Yahya. “Subspace-based signature verification technique using reduced-sensor data glove”. 2009 IEEE Symposium on Industrial Electronics and Applications (ISIEA 2009), pp. 83-88, 2009.

J. Marincic, A. Mader, and R. “Wieringa Validation of embedded system verification models”. IEEE Journal Systems, 48-54, 2011.

J. Ling, J. Chen, and C. Liu. An automatic mechanism for adjusting validation function. 22nd International Conference on Advanced Information Networking and Applications, pp. 602-607, 2008

D. Arora. A. Raghunatan, and N. K. Jha. “ Enhancing security through hardware-assisted run-time validation of program data properties”. International Conference on Hardware/Software Codesign and System Synthesis, pp. 190-195, 2005.

K.J. Cruickshank, J.B. Michael and M. T.Shing. “A validation metrics framework for safety-critical software-intensive Systems’. System of System Engineering, 2009.

T. Fawcett. “An Introduction to ROC analysis”. Science direct Pattern Recognation vol. 27, pp. 861-874, 2005.

W. Zhang, Z. Zheng, G. Pu, and H. Zhuo. Chinese text watermarking based on occlusive components. 2nd Information and Communication Technologies (ICTTA), vol. 1, pp. 1850-1854, 2006.

J. A. Memon, K. Khowaja, and H. Kazi. Evaluation of steganography for Urdu/Arabic text. Journal of Theoretical and Applied Information Technology, pp. 232-237, 2008.

S.C.D. Ghosh and N. C. Debnath. “LCS based text steganography through Indian languages.” . International Conference on Computer Technology and Development, pp. 53-57, 2010.

S. Kataria, K. Sing, T. Kumar, and M. S. Nehra. ECR (Encryption with Cover Text and Reordering) based text steganography. Proceeding of the 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013), pp. 612-616, 2013.

A. Odeh, A. Alzubi, Q.B. Hani, and K. Elleithy. Steganography by multipoint Arabic letters. Systems, Applications and Technology Conference (LISAT), 2012 IEEE Long Island , pp. 1-7, 2012.

A. Odeh, K. Elleithy, M. Faezipur. “Steganography in text by using MS Word symbols”. Proceeding of zone 1 conference of the American Society Engineering Education, pp. 1-5, 2014.

S. Bhattacharya, P. Indu, S. Duta, A. Biswas, and G. Sanyal. “Hiding data in text through in alphabet letter patterns (CALP)”. , Journal of Global Research in Computer Science, vol. 2 no. 3,33-39, 2011.

S. Mahato, D. K. Yadav, and D. A. Khan. “A modified approach to text steganography using HyperText markup language”. 2012 Third International Conference on Advanced Computing & Communication Technologies, pp. 40-44, 2013.

R. Kumar, A. Malik, S. Singh, S. Chand. “A high capacity email based text steganography scheme using huffman compression”. 3rd International Conference on Signal Processing and Integrated Networks (SPIN), pp. 3-56, (2012)

Downloads

Published

2018-07-03

How to Cite

Din, R., & Utama, S. (2018). Analysis Review of Feature-Based Method in Term of Verification and Validation Performance. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(2-4), 173–177. Retrieved from https://jtec.utem.edu.my/jtec/article/view/4338