[HTML][HTML] A review on text steganography techniques

MA Majeed, R Sulaiman, Z Shukur, MK Hasan - Mathematics, 2021 - mdpi.com
There has been a persistent requirement for safeguarding documents and the data they
contain, either in printed or electronic form. This is because the fabrication and faking of …

[HTML][HTML] Modern text hiding, text steganalysis, and applications: a comparative analysis

M Taleby Ahvanooey, Q Li, J Hou, AR Rajput, Y Chen - Entropy, 2019 - mdpi.com
Modern text hiding is an intelligent programming technique which embeds a secret
message/watermark into a cover text message/file in a hidden way to protect confidential …

Improved payload capacity in LSB image steganography uses dilated hybrid edge detection

DRIM Setiadi - 2022 - dl.acm.org
This research proposed the dilated hybrid edge detection on the three most significant bits
(MSB) pixels of cover images with the aim of expanding the edge area so as to increase the …

[HTML][HTML] PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence …

AH Mohsin, AA Zaidan, BB Zaidan… - Multimedia tools and …, 2021 - Springer
Secure updating and sharing for large amounts of healthcare information (such as medical
data on coronavirus disease 2019 [COVID-19]) in efficient and secure transmission are …

[HTML][HTML] Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure

PD Shah, RS Bichkar - … Science and Technology, an International Journal, 2021 - Elsevier
In all forms of confidential communication, the most significant element is security.
Cryptography can be used to secure the information, but it discloses the presence of covert …

High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain

AH Ali, LE George, AA Zaidan, MR Mokhtar - Multimedia Tools and …, 2018 - Springer
Abstract Information hiding researchers have been exploring techniques to improve the
security of transmitting sensitive data through an unsecured channel. This paper proposes …

CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data

R Thabit, NI Udzir, SM Yasin, A Asmawi… - IEEE Access, 2022 - ieeexplore.ieee.org
The rapid growth of online communication has increased the demand for secure
communication. Most government entities, healthcare providers, the legal sector, financial …

A detailed review based on secure data transmission using cryptography and steganography

F Varghese, P Sasikala - Wireless Personal Communications, 2023 - Springer
During the last few decades, digital communication has played a vital role in various sectors
such as healthcare departments, banking, information technology companies, industries …

Image data hiding schemes based on metaheuristic optimization: a review

A Melman, O Evsutin - Artificial Intelligence Review, 2023 - Springer
The digital content exchange on the Internet is associated with information security risks.
Hiding data in digital images is a promising direction in data protection and is an alternative …

Securing data via cryptography and arabic text steganography

M Alkhudaydi, A Gutub - SN Computer Science, 2021 - Springer
This research proposes an efficient security system for hiding classified Arabic text-data on
limited processors devices benefiting from the combination of both techniques: light-weight …