[PDF][PDF] Comparison of eight proposed security methods using linguistic steganography text

HM Ahmed, M Khodher - Journal of Computing & Information …, 2016 - researchgate.net
This paper compares eight proposed methods using steganography of Arabic language
texts for different search algorithms to consider a secret key. All methods use random …

[PDF][PDF] New text steganography technique based on a set of two-letter words

SS Baawi, MR Mokhtar, R Sulaiman - Journal of Theoretical and …, 2017 - researchgate.net
Steganography is a secret writing wherein one person communicates with another without
drawing suspicion to the secret communication through the medium. Text steganography is …

Text based steganography

R Lockwood, K Curran - International Journal of Information …, 2017 - inderscienceonline.com
Steganography is the art of hiding information within other less conspicuous information to
prevent eavesdropping by way of hiding its existence in the first place. Image based …

[PDF][PDF] Text steganography using compression and random number generators

MY Elmahi, MH Sayed - International Journal of Computer Applications …, 2017 - ijcatr.com
A lot of techniques are used to protect and hide information from any unauthorized users
such as Steganography and Cryptography. Steganography hides a message inside another …

[PDF][PDF] Modified linguistic steganography approach by using syntax bank and digital signature

ENC Wai, MA Khine - International Journal of Information and …, 2011 - researchgate.net
In today digital age, there are more demands to improve techniques for information security.
Steganography is one of the popular areas in information protection in order to establish …

Novel text steganography using natural language processing and part-of-speech tagging

B Gupta Banik, SK Bandyopadhyay - IETE Journal of Research, 2020 - Taylor & Francis
The practice of transmitting secret data by using cover data is called steganography. At
present, several versatile steganographic methods are available using different digital …

Text steganography in Letter of Credit (LC) using synonym substitution based algorithm

AA Chaw - International Journal for Advance Research and …, 2019 - ijarnd.com
Text steganography uses text files as carrier files to hide confidential information. The goal of
text steganography is to make the hidden data undetectable except the sender and receiver …

Linguistic steganography detection using statistical characteristics of correlations between words

Z Chen, L Huang, Z Yu, W Yang, L Li, X Zheng… - Information Hiding: 10th …, 2008 - Springer
Linguistic steganography is a branch of Information Hiding (IH) using written natural
language to conceal secret messages. It plays an important role in Information Security (IS) …

Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications

SMA Al-Nofaie, AAA Gutub - Multimedia Tools and Applications, 2020 - Springer
Steganography is used for multimedia data security. It is a process of hiding the data within
multimedia communication between the parties embedding the secret data inside a carrier …

A novel approach to text steganography using font size of invisible space characters in microsoft word document

S Mahato, DK Yadav, DA Khan - Intelligent Computing, Networking, and …, 2014 - Springer
Steganography is the hidden way of communication, where one individual communicates
with another through cover medium without giving any doubt about the secret …