[PDF][PDF] Information hiding: A new approach in text steganography

B Delina - Proceedings of the International Conference on …, 2008 - researchgate.net
Sending encrypted messages frequently will draw the attention of third parties, ie crackers
and hackers, perhaps causing attempts to break and reveal the original messages. In a …

[PDF][PDF] A Comparative Result Analysis of Text Based Steganographic Approaches

KKPS Pabboju - IOSR J. Comput. Eng. Ver. VII, 2015 - academia.edu
Today in this digital era everything (data) can be digitized and can be transmitted over the
communication networks. But not withstanding with this advantage it also has a downside ie …

Different techniques for hiding the text information using text steganography techniques: A survey.

VL Narayana, NA Kumar - Ingénierie des Systèmes d' …, 2018 - search.ebscohost.com
English Steganography is helping individuals to send private information between two
gatherings. It empowers client to conceal information in various advanced mediums …

Linguistic approach for text steganography through Indian text

S Changder, D Ghosh… - 2010 2nd international …, 2010 - ieeexplore.ieee.org
Steganography is the art and science of hiding a message inside another message without
drawing any suspicion to the others so that the message can only be detected by its …

[PDF][PDF] A performance of embedding process for text steganography method

B Osman, R Din, T Zalizam, T Muda… - 6th WSEAS World Congr …, 2013 - academia.edu
One of the main aspects on embedding process of any text steganography methods is the
capacity text. It is because a better embedding ratio and saving space offers; a more text can …

[PDF][PDF] A significant survey on text steganalysis techniques

S Samanta, S Pattyanayak - Int. Journal on Computer Science and …, 2020 - ijcse.net
Data concealing methods privacy, unapproved access to the substance and inaccessibility.
Steganography is the craftsmanship that conceals any data through a suitable spread …

[HTML][HTML] Systematic literature review and analysis for Arabic text steganography method practically

NA Roslan, NI Udzir, R Mahmod, A Gutub - Egyptian Informatics Journal, 2022 - Elsevier
Despite the rapidly growing studies on Arabic text steganography (ATS) noted recently;
systematic, in-depth, and critical reviews are in scarcity due to high overlap or low …

A compression-based text steganography method

E Satir, H Isik - Journal of Systems and Software, 2012 - Elsevier
In this study, capacity and security issues of text steganography have been considered to
improve by proposing a novel approach. For this purpose, a text steganography method that …

Text based steganography

R Lockwood, K Curran - International Journal of Information …, 2017 - inderscienceonline.com
Steganography is the art of hiding information within other less conspicuous information to
prevent eavesdropping by way of hiding its existence in the first place. Image based …

[引用][C] Practical evaluation and comparative study of text steganography algorithms

SS Iyer, KI Kamaljit - Int. J. Innov. Res. Comput. Commun. Eng, 2016