AM Khalaf, K Lakhtaria - AIP Conference Proceedings, 2024 - pubs.aip.org
Due to the importance, security, confidentiality, privacy, and progress of information at present due to the development in the field of information technology, sharing this …
R Din, S Utama - Borneo International Journal eISSN 2636-9826, 2023 - majmuah.com
Steganography, the art of concealing secret information within cover media, plays an important role in securing hidden messages and data protection. Text steganography, in …
R Din, R Bakar, S Utama, J Jasmis, SJ Elias - Bulletin of Electrical …, 2019 - beei.org
Steganography is a part of information hiding in covering the hidden message in any medium such as text, image, audio, video and others. This paper concerns about the …
FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation of …
R Din, S Utama, A Mustapha - Indonesian Journal of Electrical …, 2018 - repo.uum.edu.my
Steganography is one of the categories in information hiding that is implemented to conceal the hidden message to ensure it cannot be recognized by human vision. This paper focuses …
SY Huang, PS Huang - Journal of Information Science & …, 2019 - drive.google.com
Text messages can be used as the cover media for data hiding and a form of camouflage for securing secret messages. After data hiding, embedded secret messages can be correctly …
SS Iyer, K Lakhtaria - … Journal of Advanced Research in Computer …, 2016 - researchgate.net
Data Mining Techniques have been deployed in extracting solutions for Business problems. This paper is an attempt to explore the world of Data Mining techniques and how it can be …
KA Almalki, R Mohammed - 2022 2nd International Conference …, 2022 - ieeexplore.ieee.org
Hiding confidential digital information in today's modern communication system is a very challenging task. Even though many algorithms have been developed to ensure the security …
J Ferdous, MFN Khan, KM Rezaul, MA Tamal… - Int. J. Netw …, 2020 - researchgate.net
Cloud computing is the concept used to decode Daily Computing Issues. It is essentially a virtual pool of resources and also provides these tools to customers through the Internet. It is …