A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

High payload image steganography scheme with minimum distortion based on distinction grade value method

MS Taha, MSM Rahem, MM Hashim… - Multimedia Tools and …, 2022 - Springer
Presently, the design and development of an effective image steganography system are
facing several challenges including the low capacity, poor robustness and imperceptibility …

Advances in text steganography theory and research: A critical review and gaps

R Gurunath, D Samanta - Multidisciplinary Approach to Modern …, 2021 - igi-global.com
There is an immense advancement in science and technology, and computing systems with
the highest degree of security are the present hot topic; however, the domination of hackers …

[PDF][PDF] New text steganography method using the Arabic letters dots

AR Khekan, HMW Majeed, OFA Adeeb - Indonesian Journal of …, 2021 - academia.edu
With the increasing technological and electronic development, methods have been
developed to hide important information using text steganography as a new technology …

[PDF][PDF] Text Steganography based on Noorani and Darkness.

FRS Taka - J. Inf. Hiding Multim. Signal Process., 2021 - bit.kuas.edu.tw
The modern text hiding is a technique that conceals a secret message within a cover text
message using a hidden method to secure confidential information. This paper proposed a …

Image Steganography Method for Securing Multiple Images using LSB–GA

P Naveen, R Jayaraghavi - Wireless Personal Communications, 2024 - Springer
Image steganography is renowned for its flexibility and frequency in the current scenario.
This article presents a combination of LSB (Least Significant Bit) and GA (Genetic Algorithm) …

A novel method for embedding and extracting secret messages in textual documents based on paragraph resizing

B Aziz, AAAE Bukhelli, R Khusainov… - … on Security and …, 2022 - researchportal.port.ac.uk
The ancient technique of information hiding known as text steganography has enjoyed much
research in recent years due to the rising popularity of social media platforms and the …

A Steganography Approach for Hiding Data in Arabic Text based on Diacritics

A Alharbi, AA Abi Sen, NM Bahbouh… - … on Computing for …, 2024 - ieeexplore.ieee.org
Steganography has introduced a new layer of data protection, offering a higher level of
confidentiality and robustness compared to traditional encryption methods. While text-based …

Detecting the Manipulation of Text Structure in Text Steganography Using Machine Learning

B Aziz, A Bukhelli - Proceedings of the 19th …, 2023 - bnu.repository.guildhe.ac.uk
We evaluate in this paper the security of a recent method proposed in literature for the
embedding of hidden content in textual documents using paragraph size manipulation. Our …

[PDF][PDF] TextStegoHYB-Secured Way of Information Hiding

MYN Chaudhari, BH Barhate - romanpub.com
In Today's world importance of information technology is rapidly increases. Information
hiding is also a one kind of technology that has major demands in the field of Information …