[引用][C] An edge-based steganography algorithm for hiding text into images

RA Alomirah - 2019

[图书][B] Optimization models in steganography using metaheuristics

DK Sarmah, AJ Kulkarni, A Abraham - 2020 - Springer
algorithms employed for JPEG image steganography with an 8 x … Comparative analysis of
relevance feedback methods based … text steganography [69] is a technique to hide a secret text

[PDF][PDF] A novel approach to steganography: Enhanced least significant bit substitution algorithm integrated with self-determining encryption feature

R Das, M Baykara, G Tuna - Computer Systems Science and …, 2019 - academia.edu
… and practical, but is not secure and vulnerable to steganalysisstudy, to address the
disadvantage of LSB, a complementary approach is followed, and a novel LSB substitution algorithm

A Survey on Different Arabic Text Steganography Techniques

ALH Salah, M Hadwan, A Aqlan… - … on Emerging Smart …, 2021 - ieeexplore.ieee.org
… It is also considered as the practice of concealing embedded data within the apparently …
two bits of hidden information in comparison with other algorithms that can conceal one bit per …

Review on feature-based method performance in text steganography

MH Muhammad, HS Hussain, R Din, H Samad… - Bulletin of Electrical …, 2021 - beei.org
… in steganography on medium of text called text steganography that specifically focus on
feature-based method. This paper reviews some of previous research … on text steganography

[PDF][PDF] A Comparison Study using Stegexpose for Steganalysis.

E Olson, L Carter, Q Liu - 2017 - shsu-ir.tdl.org
… of steganography images based on the encoding process used within VSL. VSL contains LSB,
KLT and F5 algorithms … of stegExpose is very limited in practical steganography detection. …

A secure and size efficient approach to enhance the performance of text steganographic algorithm

M Azeem, C Yongquan, KG Rana… - 2019 11th …, 2019 - ieeexplore.ieee.org
… They practice justified text and exploit inter-word spacing, inter-sentence spacing and end-of…
RESULTS AND COMPARATIVE DISCUSSION In current section, experimental result of …

A Comparative Study of Blindhide and Filterfirst Algorithm in Digital Images for Steganography Techniques

P Purwantoro, G Garno, M Munir, A Suntia - Proceedings of the 7th …, 2020 - eudl.eu
… thing in knowing how well the steganography algorithm is used. The technique of …
research is intended to compare the method of blindhide and filterfirst steganography algorithms

Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding

N Alanazi, E Khan, A Gutub - Multimedia Tools and Applications, 2021 - Springer
… techniques outperform most reviewed existing methods to be practical, ie in order of both
efficiency … [16] developed a Kashida algorithm to improve steganography features such as …

Audio steganography: A comparative study of techniques and tools

SM Zumchak - 2016 - search.proquest.com
… is to present a comparative study on different techniques for concealing data using audio
steganography and the … While some studies have researched similar substitution algorithms