[PDF][PDF] A significant survey on text steganalysis techniques

S Samanta, S Pattyanayak - Int. Journal on Computer Science and …, 2020 - ijcse.net
Data concealing methods privacy, unapproved access to the substance and inaccessibility.
Steganography is the craftsmanship that conceals any data through a suitable spread …

[PDF][PDF] Study and analysis of text steganography tools

I Banerjee, S Bhattacharyya… - International Journal of …, 2013 - researchgate.net
“Maintain the security of the secret information”, this words has been a great challenge in our
day to day life. Sender can send messages regularly through a communication channel like …

[PDF][PDF] A review on text based steganography

P Dobriyal, J Yadav, J Jain - Int. J. Res. Publication's, 2015 - Citeseer
With the rapid growth of networking mechanisms, where large amount of data can be
transferred between users over different media, the necessity of secure systems to maintain …

Text Steganography Techniques: A Review

AA Idres, HI Yaseen - International Research Journal of …, 2023 - search.proquest.com
The large-scale information interchange that occurs across computer networks in the
modern day makes it imperative to protect that information and stop unauthorized individuals …

[PDF][PDF] A Novel Approach for Hiding Information in Text Steganography

WA Awadh - International Journal of Scientific & Engineering …, 2016 - researchgate.net
A Novel Approach for Hiding Information in Text Steganography Page 1 International Journal of
Scientific & Engineering Research, Volume 7, Issue 12, December-2016 1 ISSN 2229-5518 …

Text based steganography

R Lockwood, K Curran - International Journal of Information …, 2017 - inderscienceonline.com
Steganography is the art of hiding information within other less conspicuous information to
prevent eavesdropping by way of hiding its existence in the first place. Image based …

A review on text steganography techniques

MA Majeed, R Sulaiman, Z Shukur, MK Hasan - Mathematics, 2021 - mdpi.com
There has been a persistent requirement for safeguarding documents and the data they
contain, either in printed or electronic form. This is because the fabrication and faking of …

Advances in text steganography theory and research: A critical review and gaps

R Gurunath, D Samanta - Multidisciplinary Approach to Modern …, 2021 - igi-global.com
There is an immense advancement in science and technology, and computing systems with
the highest degree of security are the present hot topic; however, the domination of hackers …

A review analysis for text steganography

AA Shaker, FHM Ridzuan… - Malaysian Journal of …, 2018 - mjosht.usim.edu.my
Securing data is considered as a very challenging issue. The data that travels over the
Internet could be modified, altered or stolen by hackers and spies. Steganography thus …

[引用][C] Text steganography methods and its tools

A Koluguri, S Gouse, PB Reddy - International Journal of Advanced Scientific and …, 2014