Review Article

Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions

Table 1

Efficiency analysis chart.

No.Authors and YearsParametersEfficiency analysisDrawbacks
MediumCapacitySecurityImperceptibilityRobustness

1Hamdan and Hamarsheh [26]—2016TextLowHighMediumHighHigh robustness and securityThe main drawback is the length (capacity) of the cover message
2Gutub et al. [78]—2010TextHighMediumLowLowHigh capacityImperceptibility and robustness are low when applying formatting attacks
3Kim et al. [59]—2003TextHighNAHighLowHigh capacity and imperceptibilityLow robustness when applying distance algorithm spaces between words are deleted
4Yang and Kot [79]—2004TextLowHighHighMediumThe proposed system has a high capacity, imperceptibility, and capacityRobustness is down when applying distance algorithms
5Alginahi et al. [80]—2013TextLowMediumHighMediumHigh imperceptibilityCapacity is low and no robustness against formatting attacks
6Meng et al. [62]—2010TextMediumMediumHighHighHigh imperceptibility and robustnessLow capacity
7Jalil and Mirza [41]—2010Image plus textLowHighLowHighHigh robustness and securityLow imperceptibility and capacity
8Jaiswal and Patil [81]—2013TextHighLowHighLowHigh imperceptibilityRobustness and security are down
9Cheng et al. [65]—2010TextHighMediumLowMediumHigh capacityLow imperceptibility and no robustness against reformatting attack
10Mir [82]—2014TextMediumHighHighMediumHigh security and imperceptibilityNo robustness against attacks
11Meng et al. [67]—2011TextLowMediumHighHighHigh robustness, security, and imperceptibilityLow capacity
12Zhang et al. [72]—2010TextHighHighLowMediumHigh capacity and securityNo robust against copy paste and retyping attacks and low imperceptibility
13Liu et al. [83]—2015TextLowHighHighHighHigh robustness, security, and imperceptibilityLow capacity
14Alginahi et al. [35]—2014TextHighMediumLowLowHigh capacityLow imperceptibility and no robust against attacks
15Liang and Iranmanesh [84]—2016TextLowMediumHighLowHigh imperceptibilityNo robustness against attacks and low embedding capacity
16Alotaibi and Elrefaei [75]—2017TextHighMediumHighMediumHigh capacity and imperceptibilityRobustness is medium because vulnerable to retyping attacks
17Yingjie et al. [85]—2017TextLowHighMediumHighHigh robustness and securityLow capacity
18Wen et al. [76]—2018TextLowHighMediumHighHigh robustness and securityLow capacity
19Kuribayashi et al. [86]—2018TextHighMediumLowHighHigh robustness and capacityLow imperceptibility
20Jalil and Mirza [41]—2010Image plus textLowHighLowHighHigh robustness and securityLow imperceptibility and capacity
21Taha et al. [87]—2018TextHighMediumMediumLowHigh capacityNot robust against formatting attacks
22Xiao et al. [74] 2018TextLowHighMediumHighHigh robustness and securityLow capacity and only applicable to one font
23Tan et al. [88] 2018TextHighHighLowMediumHigh capacity and securityLow imperceptibility