S Tyagi, RK Dwivedi, AK Saxena - International Journal of Intelligent …, 2019 - academia.edu
In this paper, a novel approach of PDF-based text steganography is presented. A covert communication is achieved by embedding secret information at between-characters …
AA Idres, HI Yaseen - International Research Journal of …, 2023 - search.proquest.com
The large-scale information interchange that occurs across computer networks in the modern day makes it imperative to protect that information and stop unauthorized individuals …
S Changder, NC Debnath - Journal of Computational Methods …, 2009 - content.iospress.com
Steganography is the method to hide a message inside another message in such a way that can only be detected by its intended recipient. Text documents have been widely used for a …
SS Iyer, K Lakhtaria - … Journal of Advanced Research in Computer …, 2016 - researchgate.net
Data Mining Techniques have been deployed in extracting solutions for Business problems. This paper is an attempt to explore the world of Data Mining techniques and how it can be …
P Dobriyal, J Yadav, J Jain - Int. J. Res. Publication's, 2015 - Citeseer
With the rapid growth of networking mechanisms, where large amount of data can be transferred between users over different media, the necessity of secure systems to maintain …
S Dulera, D Jinwala, A Dasgupta - arXiv preprint arXiv:1203.3644, 2012 - arxiv.org
As is commonly known, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders …
LK Tyagi, A Gupta, A Mohamed - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Text steganography is the art and science of concealing hidden messages inside ordinary text without raising red flags. It's an intriguing field. Because of the increasing dependence …