A review on text steganography techniques

MA Majeed, R Sulaiman, Z Shukur, MK Hasan - Mathematics, 2021 - mdpi.com
There has been a persistent requirement for safeguarding documents and the data they
contain, either in printed or electronic form. This is because the fabrication and faking of …

Performance review of feature-based method in implementation text steganography approach

S Utama, R Din - Journal of Advanced Research in Applied …, 2022 - semarakilmu.com.my
Steganography is part of information hiding as the knowledge in science system that covers
confidential messages via text, image, audio and video. Many researchers' effort …

A double steganography model combining blockchain and interplanetary file system

W She, L Huo, Z Tian, Y Zhuang, C Niu… - Peer-to-Peer Networking …, 2021 - Springer
The secret information may be compromised for the lack of security and concealment in
conventional covert communication. Blockchain is a suitable platform for establishing covert …

A new 3-bit hiding covert channel algorithm for public data and medical data security using format-based text steganography

R Gurunath, D Samanta - Journal of Database Management (JDM), 2023 - igi-global.com
The primary concern of every individual and organization is the security of sensitive
information generated via authorized activities; nonetheless, illicit data drawing and …

Enhance Data Similarity Using a Fuzzy Approach

DK Altmemi, IS Alshawi - Journal of Positive School Psychology, 2022 - journalppw.com
Text similarity is critical in a variety of applications, including word processing, signal
processing, imagery, data mining, wireless sensor networks, etc., where text similarity …

The Design Review of Feature-based Method in Embedding the Hidden Message in Text as the Implementation of Steganography

R Din, S Utama - Borneo International Journal eISSN 2636-9826, 2023 - majmuah.com
Steganography, the art of concealing secret information within cover media, plays an
important role in securing hidden messages and data protection. Text steganography, in …

Analysis review on feature-based and word-rule based techniques in text steganography

FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
This paper presents several techniques used in text steganography in term of feature-based
and word-rule based. Additionally, it analyses the performance and the metric evaluation of …

A novel method for embedding and extracting secret messages in textual documents based on paragraph resizing

B Aziz, AAAE Bukhelli, R Khusainov… - … on Security and …, 2022 - researchportal.port.ac.uk
The ancient technique of information hiding known as text steganography has enjoyed much
research in recent years due to the rising popularity of social media platforms and the …

Review on feature-based method performance in text steganography

MH Muhammad, HS Hussain, R Din, H Samad… - Bulletin of Electrical …, 2021 - beei.org
The implementation of steganography in text domain is one the crutial issue that can hide an
essential message to avoid the intruder. It is caused every personal information mostly in …

A SURVEY PAPER ON AUTOMATED ELECTRONIC TOLLING SYSTEMS USING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY

M Phiri, L Nhapi - International Journal of Technology and Systems, 2022 - iprjb.org
Purpose: In this paper we carry out a review on Automated e-tolling systems using RFID
technology that has already been proposed by other researchers. Analysed and synthesised …