A high capacity and imperceptible text steganography using binary digit mapping on ASCII characters

A Naharuddin, AD Wibawa… - … International Seminar on …, 2018 - ieeexplore.ieee.org
Due to its light and multiplatform feature, plain text is widely used to transmit the information
in news and social media online. However, it is vulnerable to attacks (eg unauthorized …

[PDF][PDF] New robust and secure alphabet pairing text steganography algorithm

SS Iyer, K Lakhtaria - International Journal of Current Trends in …, 2016 - researchgate.net
Steganography has been practiced since ancient times. Many Linguistic Steganography
(popularly known as Text based Steganography) algorithms have been proposed like Word …

[PDF][PDF] Text hiding in text using invisible character

NAA Mustafa - International Journal of Electrical and Computer …, 2020 - academia.edu
Steganography can be defined as the art and science of hiding information in the data that
could be read by computer. This science cannot recognize stego-cover and the original one …

The Design Review of Feature-based Method in Embedding the Hidden Message in Text as the Implementation of Steganography

R Din, S Utama - Borneo International Journal eISSN 2636-9826, 2023 - majmuah.com
Steganography, the art of concealing secret information within cover media, plays an
important role in securing hidden messages and data protection. Text steganography, in …

[PDF][PDF] Comparison of Steganography at One LSB and Two LSB Positions

RS Gutte, YD Chincholkar - International Journal of Computer …, 2012 - researchgate.net
The use of Internet has been extensively increased. Sometimes, it is needed to keep the
information secret and secure without attracting the attention of unauthorized person. Here …

[PDF][PDF] Text steganography using article mapping technique (AMT) and SSCE

I Banerjee - Journal of Global Research in Computer Science, 2011 - researchgate.net
In this contribution we present a novel work of text steganography. Now a days, maintain the
security of the secret data has been a great challenge. Sender can encrypt the message …

[PDF][PDF] Novel text steganography through special code generation

I Banerjee, S Bhattacharyya, G Sanyal - Proceedings of International …, 2011 - Citeseer
Encrypted messages sending frequently draws the attention of third parties, perhaps
causing attempts to break and reveal the original messages. Steganography is introduced to …

Aggrandize text security and hiding data through text steganography

S Chaudhary, M Dave, A Sanghi - 2016 IEEE 7th Power India …, 2016 - ieeexplore.ieee.org
Steganography is the technique of cover up information in another media and protects it
from prying eyes. Modern Steganography intends to hide the data in a cover media such as …

Text steganography: a novel character‐level embedding algorithm using font attribute

BK Ramakrishnan, PK Thandra… - Security and …, 2016 - Wiley Online Library
Text Steganography uses text documents as cover medium to communicate the secret
messages, covertly, by making unnoticeable distortions in the cover medium. Character …

Text steganography approaches using similarity of English font styles

SA El Rahman - International Journal of Software Innovation (IJSI), 2019 - igi-global.com
Data protection has become a more critical issue and the necessity to secure a transmission
channel is become more serious. Therefore, steganography, the art of hidden data into a …