A comparative analysis of arabic text steganography

R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan… - Applied Sciences, 2021 - mdpi.com
Protecting sensitive information transmitted via public channels is a significant issue faced
by governments, militaries, organizations, and individuals. Steganography protects the …

An enhanced least significant bit modification technique for audio steganography

M Asad, J Gilani, A Khalid - International Conference on …, 2011 - ieeexplore.ieee.org
Increased use of electronic communication has given birth to new ways of transmitting
information securely. Audio steganography is the science of hiding some secret text or audio …

An introduction to image steganography techniques

AAJ Altaay, SB Sahib, M Zamani - … international conference on …, 2012 - ieeexplore.ieee.org
Steganography is a form of security technique through obscurity, the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …

CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data

R Thabit, NI Udzir, SM Yasin, A Asmawi… - IEEE Access, 2022 - ieeexplore.ieee.org
The rapid growth of online communication has increased the demand for secure
communication. Most government entities, healthcare providers, the legal sector, financial …

Message security through aes and lsb embedding in edge detected pixels of 3d images

Y Moussa, W Alexan - 2020 2nd Novel Intelligent and Leading …, 2020 - ieeexplore.ieee.org
This paper proposes an advanced scheme of message security in 3D cover images using
multiple layers of security. Cryptography using AES-256 is implemented in the first layer. In …

A coverless plain text steganography based on character features

K Wang, Q Gao - IEEE Access, 2019 - ieeexplore.ieee.org
The coverless text steganography has become a research hotspot in the field of information
hiding because no modification to a text carrier will improve the concealment of …

Hiding secret information using LSB based audio steganography

A Binny, M Koilakuntla - 2014 International Conference on Soft …, 2014 - ieeexplore.ieee.org
Audio signals have a characteristic redundancy and unpredictable nature that make them
ideal to be used as a cover to hide secret information. A Steganographic technique for …

Genetic algorithm for fragile audio watermarking

M Zamani, ABA Manaf - Telecommunication Systems, 2015 - Springer
A novel genetic-concept-based algorithm is proposed for fragile audio watermarking to
reduce the distortion of least significant bits substitution and consequently improve the peak …

An optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer

R Tanwar, K Singh, M Zamani… - Journal of computer …, 2019 - Wiley Online Library
Being easy to understand and simple to implement, substitution technique of performing
steganography has gain wide popularity among users as well as attackers. Steganography …

[PDF][PDF] Correlation between PSNR and bit per sample rate in audio steganography

M Zamani, ABA Manaf, SM Abdullah… - … Conference on Signal …, 2012 - academia.edu
Steganography is a form of security technique through obscurity; the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …