[PDF][PDF] Critical review of verification and validation process in feature-based method steganography

R Din, S Utama - Int. Conf. E-Commerce, 2017 - researchgate.net
This paper presents about evaluation measurement through verification and validation in
one category of steganography specifically in text domain. It reviews the one of method in …

[PDF][PDF] The Performance Evaluation of Feature-Based Technique in Text Steganography

S Utama, R Din, M Mahmuddin - J. Eng. Sci. Technol, 2017 - jestec.taylors.edu.my
The technique of steganography in text domain is widely employed because of any
agreement, report and any other important documents are in form of text, whereas other …

Substitution-based approach for linguistic steganography using antonym

FZ Mansor - 2017 - eprints.uthm.edu.my
Steganography has been a part of information technology security since a long time ago.
The study of steganography is getting attention from researchers because it helps to …