Analysis Review of Feature-Based Method in Term of Verification and Validation Performance
Keywords:Natural Language Steganography, Text Steganography, Evaluation Performance, Parameter Metric,
AbstractThe categories of information named steganography has become the options of securing hidden message that wouldn’t be detected by intruders or third party. Implementation steganography able to develop in several domains and this paper focuses on text domain of steganography. This paper particularizes the implementation one of the category of steganography in text domain that measures the evaluation performance through verification and validation approaches. It reviews one of the methods in text steganography called feature-based. This method has been established by previous researcher effort that to cover hidden message based on characteristic of letters in the text. This paper identifies the type of measurement that has been used developed as the feature-based method of text steganography. It anticipated the identification of evaluation performance through verification and validation can able to use as procedure the measurement performance in steganography implementation.
M. N. Alam, and M. A. Naser, . “Re-evaluating Chain-Code as A Feature Bangla Script”. 2013 International Conference on Electrical Information and Communication Technology (EICT), p. 1-5, 2013.
S.S. Iyer, and K. Laktharia. “New robust and secure alphabet pairing text steganography algorithm”. International Journal of Current Trends in Engineering & Research (IJCTER), vol. 2 no. 7, pp. 15-21, 2016.
M. Y. Elmahi and M. H. Sayed, “Text Steganography Using Compression and Random Number Generators,” vol. 6, no. 6, pp. 259– 263, 2017.
S. Roy and M. Manasmiti “A novel approach to format based steganography”. ICCCS’11, pp. 511-517, 2011.
R.G. Sergeant. An introduction to verification and validation of simulation models. Proceeding of the 2013 Winter Simulation Conference, pp. 321-327, 2014.
Nazir, S., Motla, Y. H., Abbas, T., Khaton A., Jaben, J., Iqra, M., & Bakhtar, K. (2014). A process improvement in requirement verification and validation using ontology. IEEE Systems Journal, 1-8.
W. A. Ghuman and J. Lassig, . Verification requirement for secure reliable cloud computing. 2013 IEEE Third International Conference on Cloud and Green Computing, pp. 143-150, 2013.
M. C. B. Alves D. Drusinsky and J. B. Michael. “End-to-End Formal Specification, Validation, and Verification Process: A Case Study of Space Flight Software”. IEEE Systems Journal, vol. 7 no. 4, 632-641, 2013.
L. B. Rogovchenko, P. Fritzon, A. Garo and A. Tundis. Requirement verification and dependency tracing during simulation in modelica. 2013 8th EUROSIM Congress on Modelling and Simulation, pp. 561- 565, 2013.
L. Xinhua, W. Weida, and L. Wenjian An intelligent methodology for business process model verification. 2007 IEEE International Conference on Control and Automation FrB6-2 Guangzhou, CHINA, pp. 2381-2385, 2007.
Y. S. W. Chen, and P. Hsiung, Y Lan,, Y. Hu, and S. Chen. “Formal modeling and verification for network-on-chip. IEEE Systems Journal, pp. 299-304, 2010.
X. Wu and Z. Yang. “Verification-based interval-passing algorithm for compressed sensing”. IEEE Signal Processing Letters, vol. 20 no. 10, pp. 934-936, 2013.
C. A. Userner, S. Gruttman, T.A. Majchrzak, T.A. and H. Kuchen Computer-supported assessment of software verification proof. International Conference on Educational and Information Technology (ICEIT 2010), pp. 115-121. 2010.
R. Rahmat, N.S. Kamel, and N. Yahya. “Subspace-based signature verification technique using reduced-sensor data glove”. 2009 IEEE Symposium on Industrial Electronics and Applications (ISIEA 2009), pp. 83-88, 2009.
J. Marincic, A. Mader, and R. “Wieringa Validation of embedded system verification models”. IEEE Journal Systems, 48-54, 2011.
J. Ling, J. Chen, and C. Liu. An automatic mechanism for adjusting validation function. 22nd International Conference on Advanced Information Networking and Applications, pp. 602-607, 2008
D. Arora. A. Raghunatan, and N. K. Jha. “ Enhancing security through hardware-assisted run-time validation of program data properties”. International Conference on Hardware/Software Codesign and System Synthesis, pp. 190-195, 2005.
K.J. Cruickshank, J.B. Michael and M. T.Shing. “A validation metrics framework for safety-critical software-intensive Systems’. System of System Engineering, 2009.
T. Fawcett. “An Introduction to ROC analysis”. Science direct Pattern Recognation vol. 27, pp. 861-874, 2005.
W. Zhang, Z. Zheng, G. Pu, and H. Zhuo. Chinese text watermarking based on occlusive components. 2nd Information and Communication Technologies (ICTTA), vol. 1, pp. 1850-1854, 2006.
J. A. Memon, K. Khowaja, and H. Kazi. Evaluation of steganography for Urdu/Arabic text. Journal of Theoretical and Applied Information Technology, pp. 232-237, 2008.
S.C.D. Ghosh and N. C. Debnath. “LCS based text steganography through Indian languages.” . International Conference on Computer Technology and Development, pp. 53-57, 2010.
S. Kataria, K. Sing, T. Kumar, and M. S. Nehra. ECR (Encryption with Cover Text and Reordering) based text steganography. Proceeding of the 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013), pp. 612-616, 2013.
A. Odeh, A. Alzubi, Q.B. Hani, and K. Elleithy. Steganography by multipoint Arabic letters. Systems, Applications and Technology Conference (LISAT), 2012 IEEE Long Island , pp. 1-7, 2012.
A. Odeh, K. Elleithy, M. Faezipur. “Steganography in text by using MS Word symbols”. Proceeding of zone 1 conference of the American Society Engineering Education, pp. 1-5, 2014.
S. Bhattacharya, P. Indu, S. Duta, A. Biswas, and G. Sanyal. “Hiding data in text through in alphabet letter patterns (CALP)”. , Journal of Global Research in Computer Science, vol. 2 no. 3,33-39, 2011.
S. Mahato, D. K. Yadav, and D. A. Khan. “A modified approach to text steganography using HyperText markup language”. 2012 Third International Conference on Advanced Computing & Communication Technologies, pp. 40-44, 2013.
R. Kumar, A. Malik, S. Singh, S. Chand. “A high capacity email based text steganography scheme using huffman compression”. 3rd International Conference on Signal Processing and Integrated Networks (SPIN), pp. 3-56, (2012)
How to Cite
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.