Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the …
A Gutub, K Alaseri - Arabian Journal for Science and Engineering, 2020 - Springer
This paper presented new models to hide sensitive data via Arabic text steganography. The models are structured to serve personal remembrance of secret shares to be used within …
M Agarwal - arXiv preprint arXiv:1302.2718, 2013 - arxiv.org
This paper presents three novel approaches of text steganography. The first approach uses the theme of missing letter puzzle where each character of message is hidden by missing …
AAA Gutub, KA Alaseri - Journal of King Saud University-Computer and …, 2021 - Elsevier
Sensitive information requires many security systems to be protected by secret keys. One of these practical security systems is the so-called counting-based secret sharing, in which …
S Al-Nofaie, A Gutub, M Al-Ghamdi - … of King Saud University-Computer and …, 2021 - Elsevier
Steganography is the process of hiding data within multimedia communication between parties by embedding the secret data inside a carrier file to be protected during its …
Steganography is the science of hiding information messages in groups of irrelevant data possibly of another form. Despite of several Arabic text steganography techniques that have …
Steganography is one of the oldest methods for securely sending and transferring secret information between two people without raising suspicion. Recently, the use of Artificial …
M Alkhudaydi, A Gutub - SN Computer Science, 2021 - Springer
This research proposes an efficient security system for hiding classified Arabic text-data on limited processors devices benefiting from the combination of both techniques: light-weight …
N Alanazi, E Khan, A Gutub - Journal of King Saud University-Computer …, 2022 - Elsevier
The need to protect confidential data stored on personal computers (PCs) or sent to other parties has increased significantly. Therefore, a secure, high-capacity strategy is needed to …