Performance review of feature-based method in implementation text steganography approach

S Utama, R Din - Journal of Advanced Research in Applied …, 2022 - semarakilmu.com.my
Steganography is part of information hiding as the knowledge in science system that covers
confidential messages via text, image, audio and video. Many researchers' effort …

Hiding text using the least significant bit technique to improve cover image in the steganography system

EHJ Halboos, AM Albakry - Bulletin of Electrical Engineering and …, 2022 - beei.org
One of the highest priorities in the era of information technology is to achieve an accurate
and effective system for hiding security data. One of the goals of steganography is …

[PDF][PDF] Review on secured data capabilities of cryptography, steganography, and watermarking domain

FQA Al-Yousuf, R Din - Indonesian Journal of Electrical …, 2020 - researchgate.net
Due to the increment of using Internet to transfer the critical and secret data, many studies
interested in secured data and investigated many ways to secure the transferred information …

Review on feature-based method performance in text steganography

MH Muhammad, HS Hussain, R Din, H Samad… - Bulletin of Electrical …, 2021 - beei.org
The implementation of steganography in text domain is one the crutial issue that can hide an
essential message to avoid the intruder. It is caused every personal information mostly in …

The Design Review of Feature-based Method in Embedding the Hidden Message in Text as the Implementation of Steganography

R Din, S Utama - Borneo International Journal eISSN 2636-9826, 2023 - majmuah.com
Steganography, the art of concealing secret information within cover media, plays an
important role in securing hidden messages and data protection. Text steganography, in …

Color image steganography in YCbCr space

ZA Alwan, HM Farhan… - International Journal of …, 2020 - search.proquest.com
Steganography is a best method for in secret communicating information during the
transference of data. Images are an appropriate method that used in steganography can be …

Analysis review on feature-based and word-rule based techniques in text steganography

FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
This paper presents several techniques used in text steganography in term of feature-based
and word-rule based. Additionally, it analyses the performance and the metric evaluation of …

Traid-bit embedding process on Arabic text steganography method

R Din, RA Thabit, NI Udzir, S Utama - Bulletin of Electrical Engineering and …, 2021 - beei.org
The enormous development in the utilization of the Internet has driven by a continuous
improvement in the region of security. The enhancement of the security embedded …

High capacity double precision image steganography based on chaotic maps

SF Al Rubaie, MKM Al-Azawi - Bulletin of Electrical Engineering and …, 2024 - beei.org
Steganography is the process of hiding confidential information within non-secret
multimedia such that the 3 rd party cannot distinguish if there is a secret message in it or not …

Application of the Canny Filter in Digital Steganography

AJQ Almaliki, SM Abd, IA Lafta, R Din… - Journal of Advanced …, 2024 - akademiabaru.com
Substitution methods, LSB variants used in steganography on bitmap images, increase their
effectiveness as the carrier images becomes noisier, that is, images with strong color …