R Hussein, W Alexan - 2019 2nd International Conference on …, 2019 - ieeexplore.ieee.org
Since the rise of the Internet, information security has been one of the most important factors in networking. Cryptography and steganography are the arts and sciences of secret …
MT Elkandoz, W Alexan - 2019 international conference on …, 2019 - ieeexplore.ieee.org
Steganography is the art of concealing a message within an unremarkable cover media in order to avoid detection. This paper proposes using both cryptography for scrambling the …
AH Khaleel, IQ Abduljaleel - Indonesian Journal of …, 2021 - faculty.uobasrah.edu.iq
Information hiding techniques are constantly evolving due to the increased need for security and confidentiality. This paper proposes a working mechanism in three phases. The first …
IQ Abduljaleel, AH Khaleel - International Journal of …, 2020 - faculty.uobasrah.edu.iq
In this paper, a new technique that hides a secret text inside a speech signal without any apparent noise is presented. The technique for encoding the secret text is through first …
Direct spread spectrum technology is traditionally used in radio communication systems with multiple access, for example, in CDMA standards, in global satellite navigation systems, in …
FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation of …
In today's digital world, confidential information exchange over public communication channel suffers from several issues. Steganography is considered to be one of the concepts …
F Aslantaş, C Hanilçi - Journal of Innovative Science and …, 2022 - dergipark.org.tr
Abstract Information security has been one of the most important issues of all time for both individuals and companies. Delivering data to the correct recipient is crucial for personal …
M Taruk, H Hamdani… - 2024 11th International …, 2024 - ieeexplore.ieee.org
The ease of exchanging information can be misused by irresponsible parties to commit various cybercrimes such as data tapping. Therefore, this study was conducted with the aim …