Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research

IJ Kadhim, P Premaratne, PJ Vial, B Halloran - Neurocomputing, 2019 - Elsevier
Storing and communicating secret and/or private information has become part of our daily
life whether it is for our employment or personal well-being. Therefore, secure storage and …

Analysis of various data security techniques of steganography: A survey

S Dhawan, R Gupta - Information Security Journal: A Global …, 2021 - Taylor & Francis
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security
is termed as a serious issue while communication of data is processed over the Internet …

A review on text steganography techniques

MA Majeed, R Sulaiman, Z Shukur, MK Hasan - Mathematics, 2021 - mdpi.com
There has been a persistent requirement for safeguarding documents and the data they
contain, either in printed or electronic form. This is because the fabrication and faking of …

[HTML][HTML] Systematic literature review and analysis for Arabic text steganography method practically

NA Roslan, NI Udzir, R Mahmod, A Gutub - Egyptian Informatics Journal, 2022 - Elsevier
Despite the rapidly growing studies on Arabic text steganography (ATS) noted recently;
systematic, in-depth, and critical reviews are in scarcity due to high overlap or low …

CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data

R Thabit, NI Udzir, SM Yasin, A Asmawi… - IEEE Access, 2022 - ieeexplore.ieee.org
The rapid growth of online communication has increased the demand for secure
communication. Most government entities, healthcare providers, the legal sector, financial …

A comparative analysis of Arabic text steganography

R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan… - Applied Sciences, 2021 - mdpi.com
Protecting sensitive information transmitted via public channels is a significant issue faced
by governments, militaries, organizations, and individuals. Steganography protects the …

Joint linguistic steganography with bert masked language model and graph attention network

C Ding, Z Fu, Q Yu, F Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Generation-based linguistic steganography embeds secret information by generating high-
quality text sequences according to the information. However, this method may cause low …

Implementation Of Least Significant Bit (LSB) Algorithm For Data Security In Digital Imagery

PSH Hasugian… - Jurnal Info Sains …, 2020 - ejournal.seaninstitute.or.id
In this study, a software was built that can insert text messages into image files
(steganography) and steganalisis or detect the presence or absence of secret messages in …

[PDF][PDF] Using special letters and diacritics in Steganography in holy Quran

NS Shakir, MS Mahdi - Iraqi Journal for Computers and Informatics, 2023 - iasj.net
Because of the great development that took place in information transfer and communication
technologies, the issue of information transfer security has become a very sensitive and …

[PDF][PDF] Image Steganography Based on Wavelet Transform and Color Space Approach

AJ Yousif - Diyala Journal of Engineering Sciences, 2020 - iasj.net
This paper presents a color image steganography scheme based on discrete wavelet
transform (DWT) and YCbCr color space. The cover image is initially transformed from RGB …