CSNTSteg: color spacing normalization text steganography model to improve capacity and invisibility of hidden data
The rapid growth of online communication has increased the demand for secure communication. Most government entities, healthcare providers, the legal sector, financial and banking, and other industries are vulnerable to information security issues. Text steganography is one way to protect secure com...
| Main Authors: | Thabit, Reema, Udzir, Nur Izura, Md Yasin, Sharifah, Asmawi, Aziah, Abdul-Aziz Gutub, Adnan |
|---|---|
| Format: | Article |
| Published: |
Institute of Electrical and Electronics Engineers
2022
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/100849/ |
Similar Items
Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
Traid-bit embedding process on Arabic text steganography method
by: Din, Roshidi, et al.
Published: (2021)
by: Din, Roshidi, et al.
Published: (2021)
Primitive structural method for high capacity text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2014)
by: Roslan, Nuur Alifah, et al.
Published: (2014)
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022)
by: Roslan, Nuur Alifah, et al.
Published: (2022)
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)
by: Roslan, Nuur Alifah, et al.
Published: (2020)
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
An embedding traid-bit method to improve the performance of Arabic text steganography
by: Thabit, Reema Ahmed Abdalla
Published: (2016)
by: Thabit, Reema Ahmed Abdalla
Published: (2016)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Invisible teachers for hidden learners?
An investigation into the perceptions of the role of the
Learning Support Assistant in the Lifelong Learning Sector
by: Spenceley, Lydia
Published: (2012)
by: Spenceley, Lydia
Published: (2012)
Hidden capacity for water preservation in mammals
by: Levesque, Danielle L.
Published: (2014)
by: Levesque, Danielle L.
Published: (2014)
Tracking using normalized cross correlation and color space
by: P., Sebastian, et al.
Published: (2007)
by: P., Sebastian, et al.
Published: (2007)
Enhancing secure QR code steganography through artificial intelligence: a conceptual framework
by: Roslan, Nuur Alifah, et al.
Published: (2025)
by: Roslan, Nuur Alifah, et al.
Published: (2025)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
The evaluation performance of letter-based techniques on text steganography method
by: Ismail, Azizan, et al.
Published: (2018)
by: Ismail, Azizan, et al.
Published: (2018)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Π -Normality In Topological Spaces And Its Generalization
by: Thabit, Sadeq Ali Saad
Published: (2013)
by: Thabit, Sadeq Ali Saad
Published: (2013)
Visualizing the 'invisible'
by: Moriarty, Philip
Published: (2015)
by: Moriarty, Philip
Published: (2015)
The invisible symphony
by: Chan, Cheong Jan, et al.
Published: (2013)
by: Chan, Cheong Jan, et al.
Published: (2013)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
A novel text steganography technique to Arabic language using reverse fatah
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Invisible untranslatability and philosophy
by: Batchelor, Kathryn
Published: (2010)
by: Batchelor, Kathryn
Published: (2010)
The Invisible Hand of the Maker
by: Martin, John
Published: (2022)
by: Martin, John
Published: (2022)
Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
Seeing the invisible: a photovoice exploration of living with, and managing the invisible symptoms of Multiple Sclerosis
by: Parker, L.
Published: (2021)
by: Parker, L.
Published: (2021)
Reaching and Hearing the Invisible: Organizational Research on Invisible Stigmatized Groups via Web Surveys
by: Trau, Raymond, et al.
Published: (2013)
by: Trau, Raymond, et al.
Published: (2013)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
Adaptive skin color classification technique for color-based face detection systems using integral image
by: Tabatabaie, Zahra Sadri, et al.
Published: (2011)
by: Tabatabaie, Zahra Sadri, et al.
Published: (2011)
Image steganography
by: Jeniffer, Chegaram
Published: (2012)
by: Jeniffer, Chegaram
Published: (2012)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
'Invisible' nurses have to find their voice
by: Shields, Linda
Published: (2011)
by: Shields, Linda
Published: (2011)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Invisible Bodies: Gender, Conflict and Peace in Mindanao
by: Hilsdon, Anne-Marie
Published: (2009)
by: Hilsdon, Anne-Marie
Published: (2009)
Improving invisibility of blind video watermarking scheme
by: Al-Deen, Ahmed A. Baha'a, et al.
Published: (2007)
by: Al-Deen, Ahmed A. Baha'a, et al.
Published: (2007)
Similar Items
-
Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
by: Thabit, Reema Ahmed Abdalla
Published: (2022) -
Traid-bit embedding process on Arabic text steganography method
by: Din, Roshidi, et al.
Published: (2021) -
Primitive structural method for high capacity text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2014) -
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022) -
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)