A comparative analysis of arabic text steganography

R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan… - Applied Sciences, 2021 - mdpi.com
Protecting sensitive information transmitted via public channels is a significant issue faced
by governments, militaries, organizations, and individuals. Steganography protects the …

A new 3-bit hiding covert channel algorithm for public data and medical data security using format-based text steganography

R Gurunath, D Samanta - Journal of Database Management (JDM), 2023 - igi-global.com
The primary concern of every individual and organization is the security of sensitive
information generated via authorized activities; nonetheless, illicit data drawing and …

Arabic text watermarking tuned for medical e-record semi-authentication

A Gutub, E Almehmadi - Journal of Engineering Research, 2023 - kuwaitjournals.org
With increasing current healthcare attention, medical e-records have gained vital
importance. Medical practical centers such as hospitals and clinics perform common …

A forward email based high capacity text steganography technique using a randomized and indexed word dictionary

G Maji, S Mandal - Multimedia Tools and Applications, 2020 - Springer
Text steganography is inherently difficult due to minimal redundant information space to hide
secret payload. The same fact limits the hiding capacity and security too. In this study, a …

[HTML][HTML] Upgrading script watermarking robustness of unusual-to-tolerate functional confirmation by secret-sharing

A Gutub, E Almehmadi - Journal of Engineering Research, 2023 - Elsevier
Watermarking is currently critical to prove copyrights authentication. This paper proposes
upgrading the counting-based secret-sharing strategy for smart trust of unusual Arabic script …

Analysis review on feature-based and word-rule based techniques in text steganography

FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
This paper presents several techniques used in text steganography in term of feature-based
and word-rule based. Additionally, it analyses the performance and the metric evaluation of …

An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)

KD Michelle, OG Gilibrays… - Journal of Independent …, 2024 - jisrc.szabist.edu.pk
Text teganography is a method used to hide confidential messages in a message's text
without arousing suspicion. This technique has been used in the past, from ancient Greece's …

A Review of Feature-based Technique in Text-based Steganography

SNM Salleh, R Din, NH Zakaria - Borneo International Journal eISSN …, 2023 - majmuah.com
Text steganography is one of the major forms of data security in communication. It is widely
applied in the modern digital era for securely transferring confidential and private data …

Стеганографічна система на основі оброблення комп'ютерних шрифтів

ОВ Скворцов - 2024 - krs.chmnu.edu.ua
Актуальність теми обумовлена зростаючою потребою у захисті інформації в умовах
постійної загрози кібератак та несанкціонованого доступу. Об'єкт роботи–процес …

[PDF][PDF] TEKNIK PENYEMBUNYIAN MESEJ DALAM STEGANOGRAFI TEKS MENGGUNAKAN PENDEKATAN WARNA RGB DAN

P RAWAK, BBIN OSMAN - core.ac.uk
Steganografi merupakan teknik untuk melindungi kerahsiaan dan integriti data di dalam
medium pelindung agar data yang disembunyikan tidak dicurigai. Penyembunyian mesej di …