[图书][B] HTML Steganography Algorithms and Detection Methods

I Sedeeq - 2018 - search.proquest.com
The work presented in this thesis is directed at steganography detection in HTML files. The
most common HTML steganography methods from the literature are considered in the …

IST: Improved steganography for HTML

KF Rafat, M Sher - 9th European Conference on Information …, 2010 - books.google.com
Who could have thought that the digitization of electronic communication would unwittingly
open gate for covert channel communication which is now being exploited for good as well …

A statistical approach to the detection of html attribute permutation steganography

S Iman, C Frans, L Alexei - International Conference on Information …, 2016 - scitepress.org
A mechanism for monitoring WWW pages to identify the presence (or otherwise) of attribute
permutation steganography is presented. The proposed mechanism is based on a statistical …

Different techniques for hiding the text information using text steganography techniques: A survey.

VL Narayana, NA Kumar - Ingénierie des Systèmes d' …, 2018 - search.ebscohost.com
English Steganography is helping individuals to send private information between two
gatherings. It empowers client to conceal information in various advanced mediums …

Digital steganography for ASCII text documents Ph. D. research proposal

KF Rafat, M Sher - Proceedings of the 7th International Conference on …, 2009 - dl.acm.org
The digitization of analog signals has inadvertently opened doors for Covert Channel
communication which is being exploited as an innocent carrier of Secret information. A …

[PDF][PDF] A High Capacity PDF Text Steganography Technique Based on Hashing Using Quadratic Probing.

S Tyagi, RK Dwivedi, AK Saxena - International Journal of Intelligent …, 2019 - academia.edu
In this paper, a novel approach of PDF-based text steganography is presented. A covert
communication is achieved by embedding secret information at between-characters …

[PDF][PDF] A survey on text based steganography

H Singh, PK Singh, K Saroha - Proceedings of the 3rd National …, 2009 - academia.edu
In a modern era of Information Technology, illicit copying and illegal distribution accompany
the adoption of widespread electronic distribution of copyrighted material. This is the main …

[PDF][PDF] Cutting Edge Steganography Using HTML Document-An Appraisal

KF Rafat - International Journal of Computer Science and …, 2016 - academia.edu
The art of hiding sensitive information within an object in a manner that the existence of that
information remains oblivious to an observer is known as Steganography. Together with …

[PDF][PDF] Information hiding: A new approach in text steganography

B Delina - Proceedings of the International Conference on …, 2008 - researchgate.net
Sending encrypted messages frequently will draw the attention of third parties, ie crackers
and hackers, perhaps causing attempts to break and reveal the original messages. In a …

Text steganography in webometrics

SR Yaghobi, H Sajedi - International Journal of Information Technology, 2021 - Springer
In the age of technology and science advancement, even powerful governments are not
immune from hackers and spies' influence. Their most important and sensitive information is …