Joint transaction-image steganography for high capacity covert communication

AI Basuki, D Rosiyadi - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Conventional secret communications suffer from communication channel insecurity and lack
of secrecy. Blockchain-based steganography comes up by proposing secure communication …

LZW-CIE: a high-capacity linguistic steganography based on LZW char index encoding

MV Arısoy - Neural Computing & Applications, 2022 - search.proquest.com
With the effect of digitalization, the transfer of all text documents over the Internet rather than
human transmission has increased, and this situation has revealed the idea that text …

Advances in text steganography theory and research: A critical review and gaps

R Gurunath, D Samanta - Multidisciplinary Approach to Modern …, 2021 - igi-global.com
There is an immense advancement in science and technology, and computing systems with
the highest degree of security are the present hot topic; however, the domination of hackers …

LZW-CIE: a high-capacity linguistic steganography based on LZW char index encoding

M Varol Arısoy - Neural Computing and Applications, 2022 - Springer
With the effect of digitalization, the transfer of all text documents over the Internet rather than
human transmission has increased, and this situation has revealed the idea that text …

A novel method for embedding and extracting secret messages in textual documents based on paragraph resizing

B Aziz, AAAE Bukhelli, R Khusainov… - … on Security and …, 2022 - researchportal.port.ac.uk
The ancient technique of information hiding known as text steganography has enjoyed much
research in recent years due to the rising popularity of social media platforms and the …

A Steganography Approach for Hiding Data in Arabic Text based on Diacritics

A Alharbi, AA Abi Sen, NM Bahbouh… - … on Computing for …, 2024 - ieeexplore.ieee.org
Steganography has introduced a new layer of data protection, offering a higher level of
confidentiality and robustness compared to traditional encryption methods. While text-based …

A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception

K Jones, E Altuncu, VNL Franqueira, Y Wang… - arXiv preprint arXiv …, 2022 - arxiv.org
In recent years there has been substantial growth in the capabilities of systems designed to
generate text that mimics the fluency and coherence of human language. From this, there …

Detecting the Manipulation of Text Structure in Text Steganography Using Machine Learning

B Aziz, A Bukhelli - Proceedings of the 19th …, 2023 - bnu.repository.guildhe.ac.uk
We evaluate in this paper the security of a recent method proposed in literature for the
embedding of hidden content in textual documents using paragraph size manipulation. Our …

Performance analysis of steganography alphanumeric text in the text based on Indonesian linguistic

RF Siahaan, M Zarlis, BB Nasution - IOP Conference Series …, 2018 - iopscience.iop.org
Become data security issues very important when the computer has been used as a means
of communication in the global network (internet). One method that is popular enough to …

[PDF][PDF] Manipulating the Perception of Paragraph Breaks: A New Theoretical Model of Textual Steganography Using Paragraphs

AAAE Bukhelli - 2023 - pure.port.ac.uk
The ancient technique of information hiding known as text steganography has enjoyed much
research in recent years due to the rising popularity of social media platforms, and the …