[HTML][HTML] Modern text hiding, text steganalysis, and applications: a comparative analysis

M Taleby Ahvanooey, Q Li, J Hou, AR Rajput, Y Chen - Entropy, 2019 - mdpi.com
Modern text hiding is an intelligent programming technique which embeds a secret
message/watermark into a cover text message/file in a hidden way to protect confidential …

[HTML][HTML] A high capacity text steganography scheme based on LZW compression and color coding

A Malik, G Sikka, HK Verma - Engineering Science and Technology, an …, 2017 - Elsevier
In this paper, capacity and security issues of text steganography have been considered by
employing LZW compression technique and color coding based approach. The proposed …

CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data

R Thabit, NI Udzir, SM Yasin, A Asmawi… - IEEE Access, 2022 - ieeexplore.ieee.org
The rapid growth of online communication has increased the demand for secure
communication. Most government entities, healthcare providers, the legal sector, financial …

A reversible data hiding scheme for interpolated images based on pixel intensity range

A Malik, G Sikka, HK Verma - Multimedia Tools and Applications, 2020 - Springer
In this paper, we propose a novel interpolation and a new reversible data hiding scheme for
upscaling the original image and hiding secret data into the upscaled/interpolated image …

[HTML][HTML] A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography

R Gurunath, D Samanta - Journal of Database Management (JDM), 2023 - igi-global.com
The primary concern of every individual and organization is the security of sensitive
information generated via authorized activities; nonetheless, illicit data drawing and …

Blockchain-based digital chain of custody multimedia evidence preservation framework for internet-of-things

A Malik, AK Sharma - Journal of Information Security and Applications, 2023 - Elsevier
Abstract The Internet of Things (IoT) has made everyday tasks more efficient using smart
devices, which are now integral parts of people's daily routines. As a result, there has been a …

A space based reversible high capacity text steganography scheme using font type and style

R Kumar, A Malik, S Singh, B Kumar… - 2016 International …, 2016 - ieeexplore.ieee.org
In this paper, we propose a space character based reversible high capacity text
steganography scheme which embeds the secret data into a Microsoft Word document. The …

[PDF][PDF] Text-based steganography using Huffman compression and AES encryption algorithm

RH Ali, JM Kadhim - Iraqi Journal of Science, 2021 - iasj.net
In every system of security, to keep important data confidential, we need a high degree of
protection. Steganography can be defined as a way of sending confidential texts through a …

Reversible data hiding scheme for LZW codes using even-odd embedding strategy

R Kumar, A Malik, S Singh, B Kumar… - 2016 International …, 2016 - ieeexplore.ieee.org
This paper proposes a reversible data hiding scheme which embeds the secret data into
LZW codes using even odd embedding strategy. It firstly compresses the cover media using …

A new image steganography technique based on pixel intensity and similarity in secret message

A Malik, R Kumar, S Singh - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
In this paper, we propose a new enhanced image steganography scheme for color images.
The proposed scheme is based on the pixel intensity of the cover image and the similarity in …