[PDF][PDF] Arabic Text Steganography Using Unicode of Non-Joined to Right Side Letters.

AA Obeidat - J. Comput. Sci., 2017 - researchgate.net
Steganography is a technique for hiding data in media in a way that makes its existence
hard to detect. Text files are a preferable format for use in steganography due to the small …

A steganography approach based on particle swarm optimization and least significant bit in color images

HA Atee, DA Hammood, AKI Yasari - AIP Conference Proceedings, 2022 - pubs.aip.org
Image steganography conceals data within a target image to the point that it becomes
invisible to the naNed eye. Stenography is the provision of superior imperceptibility of a …

[PDF][PDF] A novel RGB image steganography using simulated annealing and LCG via LSB

MJ Bawaneh, EF Al-Shalabi… - International Journal of …, 2021 - researchgate.net
The enormous prevalence of transferring official confidential digital documents via the
Internet shows the urgent need to deliver confidential messages to the recipient without …

A Novel LSB Steganography Technique Using Image Segmentation.

YY Demircan, S Ozekes - Journal of Universal Computer …, 2024 - search.ebscohost.com
Steganography is a process to hide data inside a cover file mostly used in media files like
image, video, and audio files. Least significant bit (LSB) steganography is a technique …

[PDF][PDF] Efficient steganography scheme for color images based on wavelets and chaotic maps

HN Abdullah, SF Yousif, AA Valenzuela - Iraqi Journal of Information and …, 2019 - iasj.net
In this paper, a combination of spatial domain as well as transformation domain with the aid
of chaotic sequences is used to propose an efficient steganography scheme for color …

An Adaptive Fractal Image Steganography Using Mandelbrot and Linear Congruent Generator

MJ Bawaneh, AA Obeidat… - International …, 2023 - search.proquest.com
Despite the advancements that occurred in the field of technology, information security (ie,
IS) is still deemed important and critical topic. It is still especially deemed so during the …

Steganography Method of the Bigger Size in WebP Image Using M2PAM Algorithm for Social Applications

OA Najm, AS Nori - Turkish Journal of Computer and Mathematics …, 2022 - turcomat.org
Many facets of our lives, including business, education, and social activities, have been
dominated by social media. Users of social media exchange a tremendous amount of …

[PDF][PDF] A novel steganography technique using grayscale image segmentation

FU Mangla, S Nokhaiz, M Ramzan… - International Journal of …, 2019 - researchgate.net
Steganography is used for invisible secured communication. In this technique, information is
hidden on different medium like audio, video, text, or images by using different approaches …

[PDF][PDF] SFO for enhancing steganogrphy by exploiting exact resemblance between cover and secure text.

OY Abdulhammed - Acta Scientiarum: Technology, 2022 - researchgate.net
Steganography has become an important science in security in recent years, it hides the
existence of the secret information in such a way that no one suspects the information exists …

Retracted: Spatial and transform domain based steganography using chaotic maps for color images

HN Abdullah, SF Yousif, AA Valenzuela - Journal of Fundamental and …, 2018 - ajol.info
<b>Retracted:</b> Spatial and transform domain based steganography using chaotic maps for
color images | Journal of Fundamental and Applied Sciences Main Navigation Main Content …