Research Article
Disbursal of Text Steganography in the Space of Double-Secure Algorithm
Table 2
Percentage capacity of the proposed approaches over the seven experimental samples.
| Approaches | I | II | III | IV | V | VI | VII |
| Missing letter app | 2.88 | 5.40 | 9.09 | 8.79 | 8.60 | 8.71 | 8.83 | Wordlist approach | 2.94 | 5.55 | 8.33 | 8.79 | 8.84 | 8.95 | 8.93 | Paragraph hiding method | 1.96 | 1.92 | 2.06 | 2.00 | 2.08 | 2.12 | 2.13 | DSTS approach | 1.00 | .943 | 1.02 | .996 | 1.008 | 1.003 | 1.005 | MDSTS | 4 | 3.77 | 4.08 | 3.98 | 4.032 | 4.012 | 4.020 | CMPHM | 4 | 3.77 | 4.84 | 4.55 | 4.68 | 4.96 | 5.64 |
|
|