Modern text hiding, text steganalysis, and applications: a comparative analysis

M Taleby Ahvanooey, Q Li, J Hou, AR Rajput, Y Chen - Entropy, 2019 - mdpi.com
… We present a comparative analysis of the structural based algorithms and evaluate their …
In practice, the text steganalysis is a complicated task, because of the wide variety of digital …

[PDF][PDF] A comparative study on the advancement of text steganography techniques in digital media

SS Baawi, MR Mokhtar, R Sulaiman - ARPN J. Eng. Appl. Sci, 2018 - researchgate.net
study investigates digital steganography and its techniques that primarily focus on text
steganography… attempted to develop a text steganography algorithm which uses special characters…

Recent trends in text steganography with experimental study

R Kumar, H Singh - Handbook of Computer Networks and Cyber Security …, 2020 - Springer
… , text steganography is not normally preferred due to the difficulty in finding redundant bits in
text … A module is designed for the implementation of the algorithm for embedding the text into …

A review on text steganography techniques

MA Majeed, R Sulaiman, Z Shukur, MK Hasan - Mathematics, 2021 - mdpi.com
review the existing works in the development of approaches and algorithms related to text
steganography; this review … of the practical embedded payload by selecting the best stego text

Steganography literature survey, classification and comparative study

A Fkirin, G Attiya, A El-Sayed - Communications on Applied …, 2016 - caeaccess.org
Text steganography can be achieved by many ways like: using nth text character, altering …
It also attempts to identify the requirements of a good steganographic algorithm. The main …

[PDF][PDF] A Comparative Study of Image Steganography and Text Cryptography

SN Ahmed, V Todwal - International journal of research in engineering …, 2019 - ijresm.com
… Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic
keys for both encryption of plaintext and decryption of cipher text. The keys may be identical …

Evaluation review on effectiveness and security performances of text steganography technique

R Din, S Utama, A Mustapha - Indonesian Journal of Electrical …, 2018 - repo.uum.edu.my
… techniques, the review of evaluation has some drawback such as it has problem in algorithm
… environment [43,44] Those are evaluation it is possibly influencing the quality performance …

Robust steganography in practical communication: a comparative study

T Qiao, S Xu, S Wang, X Wu, B Liu, N Zheng… - EURASIP Journal on …, 2023 - Springer
… 2, we first propose to formulate the problems of current robust steganographic algorithms;
we mainly overview three typical algorithms, which is followed by experimental results in Sect. …

[HTML][HTML] Systematic literature review and analysis for Arabic text steganography method practically

NA Roslan, NI Udzir, R Mahmod, A Gutub - Egyptian Informatics Journal, 2022 - Elsevier
… rapidly growing studies on Arabic text steganography (ATS) … among the existing review
articles linked to this research area. As … literature review (SLR) on the techniques and algorithms

[PDF][PDF] Comparative analysis of steganography technique for information security

P Yadav, S Dhall - Int. J. Math. Sci. Comput, 2020 - academia.edu
… mentioned techniques in detail by comparing algorithms based on performance metrics …
Text Steganography is the method of hiding the confidential data or information inside the text