Text based steganography

R Lockwood, K Curran - International Journal of Information …, 2017 - inderscienceonline.com
Steganography is the art of hiding information within other less conspicuous information to
prevent eavesdropping by way of hiding its existence in the first place. Image based …

[PDF][PDF] Text-based steganography using Huffman compression and AES encryption algorithm

RH Ali, JM Kadhim - Iraqi Journal of Science, 2021 - iasj.net
In every system of security, to keep important data confidential, we need a high degree of
protection. Steganography can be defined as a way of sending confidential texts through a …

Text Steganography Techniques: A Review

AA Idres, HI Yaseen - International Research Journal of …, 2023 - search.proquest.com
The large-scale information interchange that occurs across computer networks in the
modern day makes it imperative to protect that information and stop unauthorized individuals …

[PDF][PDF] Whitesteg: a new scheme in information hiding using text steganography

LY Por, TF Ang, B Delina - WSEAS transactions on computers, 2008 - researchgate.net
Sending encrypted messages frequently will draw the attention of third parties, ie crackers
and hackers, perhaps causing attempts to break and reveal the original messages. In this …

[HTML][HTML] A review on text steganography techniques

MA Majeed, R Sulaiman, Z Shukur, MK Hasan - Mathematics, 2021 - mdpi.com
There has been a persistent requirement for safeguarding documents and the data they
contain, either in printed or electronic form. This is because the fabrication and faking of …

[PDF][PDF] New Text Steganography Technique based on Multilayer Encoding with Format-Preserving Encryption and Huffman Coding

MA Majeed, R Sulaiman… - International Journal of …, 2022 - pdfs.semanticscholar.org
Steganography is the process of hiding secret data inside other media or cover media.
Balancing the requirements for capacity, security, and imperceptibility is the main challenge …

Advances in text steganography theory and research: A critical review and gaps

R Gurunath, D Samanta - Multidisciplinary Approach to Modern …, 2021 - igi-global.com
There is an immense advancement in science and technology, and computing systems with
the highest degree of security are the present hot topic; however, the domination of hackers …

Different techniques for hiding the text information using text steganography techniques: A survey.

VL Narayana, NA Kumar - Ingénierie des Systèmes d' …, 2018 - search.ebscohost.com
English Steganography is helping individuals to send private information between two
gatherings. It empowers client to conceal information in various advanced mediums …

[PDF][PDF] Information hiding: A new approach in text steganography

B Delina - Proceedings of the International Conference on …, 2008 - researchgate.net
Sending encrypted messages frequently will draw the attention of third parties, ie crackers
and hackers, perhaps causing attempts to break and reveal the original messages. In a …

Comprehensive linguistic steganography survey

A Desoky - … Journal of Information and Computer Security, 2010 - inderscienceonline.com
Contemporary steganography approaches suffer from many serious deficiencies; generally,
they attempt to hide data as detectable and suspicious noise in a cover that is assumed to …