|
No. | Authors and Years | Parameters | Efficiency analysis | Drawbacks |
Medium | Capacity | Security | Imperceptibility | Robustness |
|
1 | Hamdan and Hamarsheh [26]—2016 | Text | Low | High | Medium | High | High robustness and security | The main drawback is the length (capacity) of the cover message |
2 | Gutub et al. [78]—2010 | Text | High | Medium | Low | Low | High capacity | Imperceptibility and robustness are low when applying formatting attacks |
3 | Kim et al. [59]—2003 | Text | High | NA | High | Low | High capacity and imperceptibility | Low robustness when applying distance algorithm spaces between words are deleted |
4 | Yang and Kot [79]—2004 | Text | Low | High | High | Medium | The proposed system has a high capacity, imperceptibility, and capacity | Robustness is down when applying distance algorithms |
5 | Alginahi et al. [80]—2013 | Text | Low | Medium | High | Medium | High imperceptibility | Capacity is low and no robustness against formatting attacks |
6 | Meng et al. [62]—2010 | Text | Medium | Medium | High | High | High imperceptibility and robustness | Low capacity |
7 | Jalil and Mirza [41]—2010 | Image plus text | Low | High | Low | High | High robustness and security | Low imperceptibility and capacity |
8 | Jaiswal and Patil [81]—2013 | Text | High | Low | High | Low | High imperceptibility | Robustness and security are down |
9 | Cheng et al. [65]—2010 | Text | High | Medium | Low | Medium | High capacity | Low imperceptibility and no robustness against reformatting attack |
10 | Mir [82]—2014 | Text | Medium | High | High | Medium | High security and imperceptibility | No robustness against attacks |
11 | Meng et al. [67]—2011 | Text | Low | Medium | High | High | High robustness, security, and imperceptibility | Low capacity |
12 | Zhang et al. [72]—2010 | Text | High | High | Low | Medium | High capacity and security | No robust against copy paste and retyping attacks and low imperceptibility |
13 | Liu et al. [83]—2015 | Text | Low | High | High | High | High robustness, security, and imperceptibility | Low capacity |
14 | Alginahi et al. [35]—2014 | Text | High | Medium | Low | Low | High capacity | Low imperceptibility and no robust against attacks |
15 | Liang and Iranmanesh [84]—2016 | Text | Low | Medium | High | Low | High imperceptibility | No robustness against attacks and low embedding capacity |
16 | Alotaibi and Elrefaei [75]—2017 | Text | High | Medium | High | Medium | High capacity and imperceptibility | Robustness is medium because vulnerable to retyping attacks |
17 | Yingjie et al. [85]—2017 | Text | Low | High | Medium | High | High robustness and security | Low capacity |
18 | Wen et al. [76]—2018 | Text | Low | High | Medium | High | High robustness and security | Low capacity |
19 | Kuribayashi et al. [86]—2018 | Text | High | Medium | Low | High | High robustness and capacity | Low imperceptibility |
20 | Jalil and Mirza [41]—2010 | Image plus text | Low | High | Low | High | High robustness and security | Low imperceptibility and capacity |
21 | Taha et al. [87]—2018 | Text | High | Medium | Medium | Low | High capacity | Not robust against formatting attacks |
22 | Xiao et al. [74] 2018 | Text | Low | High | Medium | High | High robustness and security | Low capacity and only applicable to one font |
23 | Tan et al. [88] 2018 | Text | High | High | Low | Medium | High capacity and security | Low imperceptibility |
|