The evaluation performance of letter-based technique on text steganography system

R Din, R Bakar, S Utama, J Jasmis, SJ Elias - Bulletin of Electrical …, 2019 - beei.org
Steganography is a part of information hiding in covering the hidden message in any
medium such as text, image, audio, video and others. This paper concerns about the …

Evaluation review on effectiveness and security performances of text steganography technique

R Din, S Utama, A Mustapha - Indonesian Journal of Electrical …, 2018 - repo.uum.edu.my
Steganography is one of the categories in information hiding that is implemented to conceal
the hidden message to ensure it cannot be recognized by human vision. This paper focuses …

[PDF][PDF] A new approach of text steganography using ASCII values

K Joshi - International Journal of Engineering Research & …, 2018 - researchgate.net
Steganography is the art of concealing text inside other carriers (ie text, image, video or
audio) in order to provide data security and confidentiality without any suspicion. In this …

Performance review of feature-based method in implementation text steganography approach

S Utama, R Din - Journal of Advanced Research in Applied …, 2022 - semarakilmu.com.my
Steganography is part of information hiding as the knowledge in science system that covers
confidential messages via text, image, audio and video. Many researchers' effort …

[PDF][PDF] A performance of embedding process for text steganography method

B Osman, R Din, T Zalizam, T Muda… - 6th WSEAS World Congr …, 2013 - academia.edu
One of the main aspects on embedding process of any text steganography methods is the
capacity text. It is because a better embedding ratio and saving space offers; a more text can …

Evaluating the feature-based technique of text steganography based on capacity and time processing parameters

R Din, S Utama, SH Hanizan, MM Hilal… - Advanced Science …, 2018 - ingentaconnect.com
Steganography is one of information hiding research area that covers text, image, audio and
video. Many researchers utilize steganography in text domain using the feature-based …

Analysis review on feature-based and word-rule based techniques in text steganography

FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
This paper presents several techniques used in text steganography in term of feature-based
and word-rule based. Additionally, it analyses the performance and the metric evaluation of …

Capacity performance of steganography method in text based domain

B Osman, R Din, MR Idrus - … , Volume 10, Issue 3, 2015, Pages …, 2015 - dsgate.uum.edu.my
Capacity is one of the performance factors in embedding process of any text steganography
methods. A better embedding ratio and saving space ratio offers more text can be hidden …

[PDF][PDF] Whitesteg: a new scheme in information hiding using text steganography

LY Por, TF Ang, B Delina - WSEAS transactions on computers, 2008 - researchgate.net
Sending encrypted messages frequently will draw the attention of third parties, ie crackers
and hackers, perhaps causing attempts to break and reveal the original messages. In this …

An improved version of Persian/Arabic text steganography using" La" Word

M Shirali-Shahreza… - 2008 6th National …, 2008 - ieeexplore.ieee.org
By expanding communication, in some cases there is a need for hidden communication.
Steganography is one of the methods used for hidden exchange of information …