[PDF][PDF] A study of text steganography methods

FC Akbar, TW Purboyo, R Latuconsina - J. Eng. Appl. Sci, 2019 - academia.edu
Based on the development of information and communication technology, then the security
improvement will be more important. One of them is the level of security in inserting data or …

[PDF][PDF] An efficient text steganography scheme using Unicode Space Characters

R Kumar, S Chand, S Singh - Int. J. Forensic Comput. Sci, 2015 - researchgate.net
In this paper, we propose an efficient text steganography scheme using Unicode characters
which hides the secret data into the Microsoft word document. It hides the secret data into …

[PDF][PDF] Evaluative approach towards text steganographic techniques

S Kingslin, N Kavitha - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
Objectives: Steganography is a technique for hiding data in sensitive applications such as
banking and legal fields. With Steganography the secret information can be passed without …

An evolution of Hindi text steganography

K Alla, RSR Prasad - 2009 Sixth International Conference on …, 2009 - ieeexplore.ieee.org
This paper presents a novel steganography scheme suitable for Hindi text. It can be
classified under text steganography. Conveying information secretly and establishing a …

[PDF][PDF] Stegchat: a synonym-substitution based algorithm for text steganography

J Gardiner - Submitted in conformity with the requirements for the …, 2012 - lancaster.ac.uk
Steganography, the art of information hiding, has been around for thousands of years, with
the earliest examples coming from as early as 450 BC Modern steganography can be …

Steganography in TeX documents

M Shirali-Shahreza… - 2008 3rd International …, 2008 - ieeexplore.ieee.org
Steganography is a method for hidden exchange of information by hiding data in a cover
media such as image or sound. Text Steganography is one of the most difficult methods …

[PDF][PDF] Text steganography techniques: A review

N Rani, J Chaudhary - International Journal of Engineering …, 2013 - researchgate.net
Steganography has been in use since the presence of secret messages and this use has
gained popularity as the internet became well-liked. Text steganography is a sub part of …

Experimental analysis and comparison of LSB substitution and LSB matching method of information security

A Rashid - International Journal of Computer Science Issues …, 2015 - search.proquest.com
Steganography is an art of covert communications. Its core function is to conceal the
occurrence of communication over a civic channel. Hiding the occurrence of communication …

[PDF][PDF] A text information hiding algorithm based on alternatives

L Gongshen, D Xiaoyun, S Bo, M Kui - Journal of Software, 2013 - jsoftware.us
In this paper, we analyze existing text-based steganography techniques, and propose an
efficient information hiding algorithm for text based on substituted conception. In this …

[PDF][PDF] A Novel approach of text steganography using nonlinear character positions (NCP)

S Samanta, S Dutta, G Sanyal - International Journal of Computer …, 2014 - academia.edu
Usually, the steganographic algorithms employ images, audio, video or text files as the
medium to ensure hidden exchange of information between multiple contenders and to …