Research Article
Disbursal of Text Steganography in the Space of Double-Secure Algorithm
Table 7
Comparison of existing processes with the proposed methods.
| Approaches | Cover | Works on | A. V. capacity (%) | Security | Av. Jaro |
| Missing letter puzzle | Letter puzzle | ASCII number | 7.62 | Secure | 0.97 | Wordlist approach | List of words | ASCII number | 7.67 | More secure | 1 | CMPHM | Natural-looking cover text | Binary number UTF-16 | 4.63 | | 1 | MDSTS | Natural-looking cover text | Binary number UTF-16 | 3.98 | | 1 | PHM | Natural-looking cover text | Binary number | 2.057 | | 1 | DSTS approach | Natural-looking cover text | Binary number UTF-16 | 1 | | 1 | DSTS approach | Natural-looking cover text | Binary number UTF-8 | 1.66 | | 1 | PHM | Natural-looking cover text | Binary number UTF-8 | 1.95 | | 1 | MDSTS | Natural-looking cover text | Binary number UTF-8 | 6.49 | | 1 | CMPHM | Natural-looking cover text | Binary number UTF-8 | 7.76 | | 1 |
|
|