A comparative analysis of arabic text steganography

R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan… - Applied Sciences, 2021 - mdpi.com
Protecting sensitive information transmitted via public channels is a significant issue faced
by governments, militaries, organizations, and individuals. Steganography protects the …

Performance review of feature-based method in implementation text steganography approach

S Utama, R Din - Journal of Advanced Research in Applied …, 2022 - semarakilmu.com.my
Steganography is part of information hiding as the knowledge in science system that covers
confidential messages via text, image, audio and video. Many researchers' effort …

The Design Review of Feature-based Method in Embedding the Hidden Message in Text as the Implementation of Steganography

R Din, S Utama - Borneo International Journal eISSN 2636-9826, 2023 - majmuah.com
Steganography, the art of concealing secret information within cover media, plays an
important role in securing hidden messages and data protection. Text steganography, in …

Analysis review on feature-based and word-rule based techniques in text steganography

FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
This paper presents several techniques used in text steganography in term of feature-based
and word-rule based. Additionally, it analyses the performance and the metric evaluation of …

[PDF][PDF] Evaluation review on effectiveness and security performances of text steganography technique

R Din, S Utama, A Mustapha - Indonesian Journal of Electrical …, 2018 - researchgate.net
Steganography is one of the categories in information hiding that is implemented to conceal
the hidden message to ensure it cannot be recognized by human vision. This paper focuses …

Review on feature-based method performance in text steganography

MH Muhammad, HS Hussain, R Din, H Samad… - Bulletin of Electrical …, 2021 - beei.org
The implementation of steganography in text domain is one the crutial issue that can hide an
essential message to avoid the intruder. It is caused every personal information mostly in …

A Time-Based Dynamic Operation Model for Webpage Steganography Methods

S Yuk, Y Cho - Electronics, 2020 - mdpi.com
The webpage steganography technique has been used for a covert communication method
for various purposes in which a sender embeds a secret message into a plain webpage file …

RSA Secured Web Based Steganography Employing HTML Space Codes And Compression Technique

I Bajaj, RK Aggarwal - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Web development has given its way to develop the strategies to secure the information
available on the web. The data can be secured in numerous ways and one of the common …

Absolutely indiscernible data transfer channel

M Styugin - Proceedings of The 14th European Conference on …, 2015 - books.google.com
The present paper reviews the technology for establishing absolutely indiscernible data
transfer channels. The fact of message transfer is only known to the sender and the …

[HTML][HTML] Personal characters to bits mapping using dot pattern character encoding scheme (DPCES)

S Mahato, DK Yadav, DA Khan - Journal of King Saud University-Computer …, 2020 - Elsevier
In this paper, a flexible dot-pattern based mapping technique for steganographic encoding
of messages is presented, with the aim that statistical analysis would not reveal the secret …