Performance Review of Feature-Based Method in Implementation Text Steganography Approach

S Utama, R Din - Journal of Advanced Research in Applied …, 2022 - semarakilmu.com.my
Steganography is part of information hiding as the knowledge in science system that covers
confidential messages via text, image, audio and video. Many researchers' effort …

The evaluation performance of letter-based technique on text steganography system

R Din, R Bakar, S Utama, J Jasmis, SJ Elias - Bulletin of Electrical …, 2019 - beei.org
Steganography is a part of information hiding in covering the hidden message in any
medium such as text, image, audio, video and others. This paper concerns about the …

The Design Review of Feature-based Method in Embedding the Hidden Message in Text as the Implementation of Steganography

R Din, S Utama - Borneo International Journal eISSN 2636-9826, 2023 - majmuah.com
Steganography, the art of concealing secret information within cover media, plays an
important role in securing hidden messages and data protection. Text steganography, in …

Analysis review on feature-based and word-rule based techniques in text steganography

FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
This paper presents several techniques used in text steganography in term of feature-based
and word-rule based. Additionally, it analyses the performance and the metric evaluation of …

Evaluation review on effectiveness and security performances of text steganography technique

R Din, S Utama, A Mustapha - Indonesian Journal of Electrical …, 2018 - repo.uum.edu.my
Steganography is one of the categories in information hiding that is implemented to conceal
the hidden message to ensure it cannot be recognized by human vision. This paper focuses …

A review of steganography techniques

AM Khalaf, K Lakhtaria - AIP Conference Proceedings, 2024 - pubs.aip.org
Due to the importance, security, confidentiality, privacy, and progress of information at
present due to the development in the field of information technology, sharing this …

[PDF][PDF] A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms.

J Ferdous, MFN Khan, KM Rezaul, MA Tamal… - Int. J. Netw …, 2020 - researchgate.net
Cloud computing is the concept used to decode Daily Computing Issues. It is essentially a
virtual pool of resources and also provides these tools to customers through the Internet. It is …

A Homophone-based Chinese Text Steganography Scheme for Chatting Applications.

SY Huang, PS Huang - Journal of Information Science & …, 2019 - search.ebscohost.com
Text messages can be used as the cover media for data hiding and a form of camouflage for
securing secret messages. After data hiding, embedded secret messages can be correctly …

[PDF][PDF] Clustering Algorithm for Text Steganography

SS Iyer, K Lakhtaria - … Journal of Advanced Research in Computer …, 2016 - researchgate.net
Data Mining Techniques have been deployed in extracting solutions for Business problems.
This paper is an attempt to explore the world of Data Mining techniques and how it can be …

A Review of Feature-based Technique in Text-based Steganography

SNM Salleh, R Din, NH Zakaria - Borneo International Journal eISSN …, 2023 - majmuah.com
Text steganography is one of the major forms of data security in communication. It is widely
applied in the modern digital era for securely transferring confidential and private data …