Research Article

Disbursal of Text Steganography in the Space of Double-Secure Algorithm

Table 7

Comparison of existing processes with the proposed methods.

ApproachesCoverWorks onA. V. capacity (%)SecurityAv. Jaro

Missing letter puzzleLetter puzzleASCII number7.62Secure0.97
Wordlist approachList of wordsASCII number7.67More secure1
CMPHMNatural-looking cover textBinary number UTF-164.631
MDSTSNatural-looking cover textBinary number UTF-163.981
PHMNatural-looking cover textBinary number2.0571
DSTS approachNatural-looking cover textBinary number UTF-1611
DSTS approachNatural-looking cover textBinary number UTF-81.661
PHMNatural-looking cover textBinary number UTF-81.951
MDSTSNatural-looking cover textBinary number UTF-86.491
CMPHMNatural-looking cover textBinary number UTF-87.761