Hybrid Arabic text steganography

HMS Alshahrani, G Weir - International Journal of Computer …, 2017 - strathprints.strath.ac.uk
An improved method for Arabic text steganography is introduced in this paper. This method
hides an Arabic text inside another based on a hybrid approach. Both Kashida and Arabic …

[PDF][PDF] A Proposed Algorithm for Text in Image Steganography based on Character Pairing and Positioning

N Kaul, M Chandra - International Journal of Computer Applications, 2015 - Citeseer
In a very less time internet has got heights. In every organization internet is the main
employee without which the organization will doom. Most of the work is done, saved, edited …

[PDF][PDF] Stegchat: a synonym-substitution based algorithm for text steganography

J Gardiner - Submitted in conformity with the requirements for the …, 2012 - lancaster.ac.uk
Steganography, the art of information hiding, has been around for thousands of years, with
the earliest examples coming from as early as 450 BC Modern steganography can be …

Review on feature-based method performance in text steganography

MH Muhammad, HS Hussain, R Din, H Samad… - Bulletin of Electrical …, 2021 - beei.org
The implementation of steganography in text domain is one the crutial issue that can hide an
essential message to avoid the intruder. It is caused every personal information mostly in …

[HTML][HTML] A comparative analysis of Arabic text steganography

R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan… - Applied Sciences, 2021 - mdpi.com
Protecting sensitive information transmitted via public channels is a significant issue faced
by governments, militaries, organizations, and individuals. Steganography protects the …

Enhancement of text steganography technique using Lempel-Ziv-Welch Algorithm and two-letter word technique

SS Baawi, MR Mokhtar, R Sulaiman - Recent Trends in Data Science and …, 2019 - Springer
Text steganography is regarded as the most challenging type to hide secret data to a text file
because it is not enough unnecessary information compared with other carrier files. This …

[HTML][HTML] A review on text steganography techniques

MA Majeed, R Sulaiman, Z Shukur, MK Hasan - Mathematics, 2021 - mdpi.com
There has been a persistent requirement for safeguarding documents and the data they
contain, either in printed or electronic form. This is because the fabrication and faking of …

[PDF][PDF] Classification and ways of development of text steganography methods

NR Zaynalov, SA Aliev, AN Muhamadiev… - ISJ Theor Appl …, 2019 - researchgate.net
Steganography is based on hiding or embedding additional information in digital objects,
while causing some distortion of these objects. In this case, as objects or container can be …

Indian script encoding technique (ISET): a Hindi text steganography approach

S Chaudhary, M Dave, A Sanghi, H Sidh - Information and Communication …, 2018 - Springer
A prehistoric technique of concealing clandestine information is steganography which takes
use of a shelter media as text, audio, video, etc. The most important thing related to same is …

An overview of text steganalysis

Y Yang, L Zha, Z Zhang, J Wen - … on Image, Vision and Intelligent Systems …, 2022 - Springer
With the rapid development of the Internet, network information security is progressively
under menace. Text steganography is one of the key reasons to affect information content …