Modern text hiding, text steganalysis, and applications: a comparative analysis

M Taleby Ahvanooey, Q Li, J Hou, AR Rajput, Y Chen - Entropy, 2019 - mdpi.com
Modern text hiding is an intelligent programming technique which embeds a secret
message/watermark into a cover text message/file in a hidden way to protect confidential …

A comparative analysis of arabic text steganography

R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan… - Applied Sciences, 2021 - mdpi.com
Protecting sensitive information transmitted via public channels is a significant issue faced
by governments, militaries, organizations, and individuals. Steganography protects the …

A prediction-based lossless image compression procedure using dimension reduction and Huffman coding

MA Rahman, M Hamada - Multimedia Tools and Applications, 2023 - Springer
Advanced therapeutic imaging innovation produces an immense amount of information,
predominantly from processed tomography and other imaging modalities. This causes a …

[HTML][HTML] A novel steganography method using transliteration of Bengali text

M Khairullah - Journal of King Saud University-Computer and …, 2019 - Elsevier
In this paper, we present a simple and novel approach for steganography through
transliteration. A phonetic keyboard layout is very popular for writing languages having non …

DNA encryption algorithm based on Huffman coding

M Meftah, AA Pacha, N Hadj-Said - Journal of Discrete …, 2022 - Taylor & Francis
Today, the transmission of hypersensitive data through public communication, poses a real
problem for an unauthorized recipient which makes information security very important. The …

Disbursal of Text Steganography in the Space of Double‐Secure Algorithm

Y Khan, A Algarni, A Fayomi… - Mathematical Problems …, 2021 - Wiley Online Library
Hackers reveal sensitive information from encrypted conversations as the globe has become
one community. As a result, steganography and cryptography are used together to …

Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes

B Osman, NI Yahya, K Mohd Zaini… - … Innovation and Analytics …, 2023 - repo.uum.edu.my
Data communication over the Internet has increased significantly, resulting in high data
traffic and concerns over data security. Information sent over the Internet always gets the …

Image steganography based on SVD and DWT techniques

B Lakshmi Sirisha - Journal of Discrete Mathematical Sciences and …, 2020 - Taylor & Francis
Steganography is an invisible communication. It embeds the secret details into cover to
generate the stego information. A novel image steganography approach based on Singular …

Secure data hiding scheme using firefly algorithm with hidden compression

S Sharma, H Patil - Journal of Discrete Mathematical Sciences and …, 2020 - Taylor & Francis
The goal of proposed procedure is to make a protected information concealing framework to
shroud the incognito information by finding the intense area in the spread picture to such an …

[PDF][PDF] Extensive dual tree complex wavelet transform-based image steganography using SVD and CNN subspace

J Khandelwal, VK Sharma - … .s3.ap-south-1.amazonaws.com
The secret data is hidden behind a cover image using digital image steganography
technology that prevents the human visual system (HVS) from identifying it. The proposed …