[PDF][PDF] A performance of embedding process for text steganography method

B Osman, R Din, T Zalizam, T Muda… - 6th WSEAS World Congr …, 2013 - academia.edu
One of the main aspects on embedding process of any text steganography methods is the
capacity text. It is because a better embedding ratio and saving space offers; a more text can …

Capacity performance of steganography method in text based domain

B Osman, R Din, MR Idrus - … , Volume 10, Issue 3, 2015, Pages …, 2015 - dsgate.uum.edu.my
Capacity is one of the performance factors in embedding process of any text steganography
methods. A better embedding ratio and saving space ratio offers more text can be hidden …

[PDF][PDF] Information hiding: A new approach in text steganography

B Delina - Proceedings of the International Conference on …, 2008 - avierfjard.nu
Sending encrypted messages frequently will draw the attention of third parties, ie crackers
and hackers, perhaps causing attempts to break and reveal the original messages. In a …

[PDF][PDF] Whitesteg: a new scheme in information hiding using text steganography

LY Por, TF Ang, B Delina - WSEAS transactions on computers, 2008 - researchgate.net
Sending encrypted messages frequently will draw the attention of third parties, ie crackers
and hackers, perhaps causing attempts to break and reveal the original messages. In this …

Analysis review on feature-based and word-rule based techniques in text steganography

FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
This paper presents several techniques used in text steganography in term of feature-based
and word-rule based. Additionally, it analyses the performance and the metric evaluation of …

Different techniques for hiding the text information using text steganography techniques: A survey.

VL Narayana, NA Kumar - Ingénierie des Systèmes d' …, 2018 - search.ebscohost.com
English Steganography is helping individuals to send private information between two
gatherings. It empowers client to conceal information in various advanced mediums …

[PDF][PDF] Text steganography with multi level shielding

SR Govada, BS Kumar, M Devarakonda… - … Journal of Computer …, 2012 - researchgate.net
Steganography it is a form of security through obscurity. It is the art and science of writing
hidden messages in such a way that no one, except sender and intended recipient can …

[PDF][PDF] Classification and ways of development of text steganography methods

NR Zaynalov, SA Aliev, AN Muhamadiev… - ISJ Theor Appl …, 2019 - researchgate.net
Steganography is based on hiding or embedding additional information in digital objects,
while causing some distortion of these objects. In this case, as objects or container can be …

Evaluation review on effectiveness and security performances of text steganography technique

R Din, S Utama, A Mustapha - Indonesian Journal of Electrical …, 2018 - repo.uum.edu.my
Steganography is one of the categories in information hiding that is implemented to conceal
the hidden message to ensure it cannot be recognized by human vision. This paper focuses …

[PDF][PDF] Text steganography method based on modified run length encoding

SM Kadhem - Iraqi Journal of Science, 2016 - iasj.net
Data hiding (Steganography) is a method used for data security purpose and to protect the
data during its transmission. Steganography is used to hide the communication between two …