Comparative Evaluation of Alpha-based Representative Binary Technique Toward Other Dual-bit Techniques Feature-based Method in Text Steganography

Authors

  • Sunariya Utama School of Computing UUM College Arts and Sciences, Universiti Utara Malaysia, 06010, Sintok, Kedah, Malaysia
  • Roshidi Din School of Computing UUM College Arts and Sciences, Universiti Utara Malaysia, 06010, Sintok, Kedah, Malaysia
  • Osman Ghazali School of Computing UUM College Arts and Sciences, Universiti Utara Malaysia, 06010, Sintok, Kedah, Malaysia
  • Hrudaya Kumar Tripathy Kalinga Institute of Industrial Technology, Bhubaneswar, Odisha India
  • Nurul Hafizah Hazwani Hashim School of Quantitative Sciences UUM College Arts and Sciences, Universiti Utara Malaysia, 06010, Sintok, Kedah, Malaysia

Keywords:

Feature-based Method, information hiding, Alpha-based Representative Binary, One-Flow-2-bit, Bit-One-Count, evaluation metric

Abstract

This paper investigates the performance of three distinct feature-based text steganography techniques designed for secure data concealment. It evaluates the novel Alpha-based Representative Binary technique of feature-based method, which uses letter case (capital and small) to represent binary data, alongside the One-Flow-2-bit technique, which classifies letters by their visual writability, and the Bit-One-Count technique, which uses the count of '1' bits in a letter’s binary form. Using a standardized validation framework applied to a substantial dataset, the techniques are assessed on their core operational capabilities for embedding and extracting hidden messages. Key performance metrics, including precision, recall, accuracy, and F-measure, are employed to provide a quantitative and multi-faceted comparison. The findings offer critical insights into the relative strengths, limitations, and practical implications of each method, contributing to the evidence-based advancement of reliable text steganography for security applications. This paper provide also provides a clear, evidence-based framework for selecting effective text steganography methods in security applications

Author Biographies

Sunariya Utama, School of Computing UUM College Arts and Sciences, Universiti Utara Malaysia, 06010, Sintok, Kedah, Malaysia

sunariya.utama@uum.edu.my

Roshidi Din, School of Computing UUM College Arts and Sciences, Universiti Utara Malaysia, 06010, Sintok, Kedah, Malaysia

roshidi@uum.edu.my

Osman Ghazali, School of Computing UUM College Arts and Sciences, Universiti Utara Malaysia, 06010, Sintok, Kedah, Malaysia

osman@uum.edu.my

Hrudaya Kumar Tripathy, Kalinga Institute of Industrial Technology, Bhubaneswar, Odisha India

hktypathyfcs@kiit.ac.in

Nurul Hafizah Hazwani Hashim, School of Quantitative Sciences UUM College Arts and Sciences, Universiti Utara Malaysia, 06010, Sintok, Kedah, Malaysia

nurul_hafizah_h2@ahsgs.uum.edu.my

Downloads

Published

2026-02-01

How to Cite

Utama, S., Din, R., Ghazali, O., Tripathy, H. K., & Hashim, N. H. H. (2026). Comparative Evaluation of Alpha-based Representative Binary Technique Toward Other Dual-bit Techniques Feature-based Method in Text Steganography. International Journal of Advanced Research in Computational Thinking and Data Science, 8(1), 1–12. Retrieved from https://karyailham.com.my/index.php/ctds/article/view/927

Issue

Section

Articles

Similar Articles

<< < 1 2 3 > >> 

You may also start an advanced similarity search for this article.