… rapidly growing studies on Arabic textsteganography (ATS) … among the existing review articles linked to this research area. As … literature review (SLR) on the techniques and algorithms …
… speaking about such an algorithms. The comparativeanalysis and the datasets/evaluation features … has the most realistic character distribution since it is real English text, the rest of the …
FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
… By using language-based, the robustness of the textsteganographyalgorithm will be … the quality and the security of textsteganographyalgorithms, the increment in the capacity …
V Kumar, G Singh, B Singh - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
… the security of combination of steganography and cryptography by using ECC algorithm. This algorithm is used here to produce public and private key for encryption of plain text. Also, a …
SA El_Rahman - Computers & Electrical Engineering, 2018 - Elsevier
… Steganography is the practice of concealing the communication existence by hiding the … This paper aims to study Discrete Cosine Transform (DCT) based steganography Using DC …
B Kumar Pandey, D Pandey, VK Nassa… - The Imaging Science …, 2021 - Taylor & Francis
… In this study, an effective security structure was presented … textsteganography for concealing categorized Arabic text … (bit mask-oriented genetic algorithm) to decrease the repetition …
A Makarov, E Yakovleva - 2016 18th Conference of Open …, 2016 - ieeexplore.ieee.org
… secret key, which provides theoretical and practical secrecy of the stegosystem, and detection, … other half toning algorithms. Thus, the proposed steganographic system provides desired …
… technique and conduct practical experiments to evaluate it … and related works on text steganography. Section III presents … researchers design a textsteganographyalgorithm. However, …
SS Iyer, K Lakhtaria - … Current Trends in Engineering & Research …, 2016 - researchgate.net
… have been proposed in the area of Linguistic Steganography. The comparativestudy of some of the papers is presented here in summary form. This comparativestudy has been …