Systematic literature review and analysis for Arabic text steganography method practically
Despite the rapidly growing studies on Arabic text steganography (ATS) noted recently; systematic, in-depth, and critical reviews are in scarcity due to high overlap or low segregation level among the existing review articles linked to this research area. As such, the objective of this paper is to p...
| Main Authors: | Roslan, Nuur Alifah, Udzir, Nur Izura, Mahmod, Ramlan, Gutub, Adnan |
|---|---|
| Format: | Article |
| Published: |
Elsevier
2022
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/103416/ |
Similar Items
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
Primitive structural method for high capacity text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2014)
by: Roslan, Nuur Alifah, et al.
Published: (2014)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)
by: Roslan, Nuur Alifah, et al.
Published: (2020)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)
by: Roslan, Nuur Alifah
Published: (2011)
Traid-bit embedding process on Arabic text steganography method
by: Din, Roshidi, et al.
Published: (2021)
by: Din, Roshidi, et al.
Published: (2021)
Enhancing secure QR code steganography through artificial intelligence: a conceptual framework
by: Roslan, Nuur Alifah, et al.
Published: (2025)
by: Roslan, Nuur Alifah, et al.
Published: (2025)
CSNTSteg: color spacing normalization text steganography model to improve capacity and invisibility of hidden data
by: Thabit, Reema, et al.
Published: (2022)
by: Thabit, Reema, et al.
Published: (2022)
A novel text steganography technique to Arabic language using reverse fatah
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
The evaluation performance of letter-based techniques on text steganography method
by: Ismail, Azizan, et al.
Published: (2018)
by: Ismail, Azizan, et al.
Published: (2018)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Using Visual Text Mining to Support the Study Selection in Systematic Literature Reviews
by: Kartia, Felizardo, et al.
Published: (2011)
by: Kartia, Felizardo, et al.
Published: (2011)
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
by: Husin, Norzihan, et al.
Published: (2014)
by: Husin, Norzihan, et al.
Published: (2014)
Arabic text classification: Review study
by: Hijazi, Musab Mustafa, et al.
Published: (2016)
by: Hijazi, Musab Mustafa, et al.
Published: (2016)
Method and system for steganography within handwritten signature images
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
Tangani salah guna AI
by: Roslan, Nuur Alifah
Published: (2024)
by: Roslan, Nuur Alifah
Published: (2024)
Teknologi AI bakal kuasai karya digital
by: Roslan, Nuur Alifah
Published: (2023)
by: Roslan, Nuur Alifah
Published: (2023)
Pertahan hak kebebasan digital
by: Roslan, Nuur Alifah
Published: (2024)
by: Roslan, Nuur Alifah
Published: (2024)
Systematic literature review on green IT practice and organizational sustainability
by: Abdul Kader Jailani, Sri Fatiany, et al.
Published: (2017)
by: Abdul Kader Jailani, Sri Fatiany, et al.
Published: (2017)
Systematic literature review on green practice and execution factors
by: Abdul Kader Jailani, Sri Fatiany, et al.
Published: (2016)
by: Abdul Kader Jailani, Sri Fatiany, et al.
Published: (2016)
Systematic literature review on green IT
practice and executional factors
by: Abdul Kader Jailani, Sri Fatiany, et al.
Published: (2017)
by: Abdul Kader Jailani, Sri Fatiany, et al.
Published: (2017)
Arabic text
by: Abuzaraida, Mustafa, et al.
Published: (2015)
by: Abuzaraida, Mustafa, et al.
Published: (2015)
A review of Arabic text recognition dataset
by: Idris Saleh Al-Sheikh,, et al.
Published: (2020)
by: Idris Saleh Al-Sheikh,, et al.
Published: (2020)
Artificial intelligence in the United Arab Emirates public sector: A systematic literature review
by: Akhoirshieda, Modafar Shaker, et al.
Published: (2024)
by: Akhoirshieda, Modafar Shaker, et al.
Published: (2024)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Image steganography
by: Jeniffer, Chegaram
Published: (2012)
by: Jeniffer, Chegaram
Published: (2012)
A systematic review of adapting immersive technology in enhancing teaching and learning for students in higher education
by: Jantan, Azrul Hazri, et al.
Published: (2024)
by: Jantan, Azrul Hazri, et al.
Published: (2024)
A systematic literature review of the types of authentication safety practices among internet users
by: Kovalan, Krishnapriyaa, et al.
Published: (2021)
by: Kovalan, Krishnapriyaa, et al.
Published: (2021)
Systematic literature review of the research design based on fatwa methods
by: Siti Aishah Zainuddin,, et al.
Published: (2024)
by: Siti Aishah Zainuddin,, et al.
Published: (2024)
Enhancing image-emoji graphical password multi-factor authentication by utilizing single touch and multi-touch gesture
by: Roslan, Nuur Alifah, et al.
Published: (2024)
by: Roslan, Nuur Alifah, et al.
Published: (2024)
Systematic literature review of learning strategies for Arabic speaking skills among non-native speakers
by: Haryati Yaacob,, et al.
Published: (2024)
by: Haryati Yaacob,, et al.
Published: (2024)
System and method of transforming text into image for information hiding
by: Mahmod, Ramlan, et al.
Published: (2010)
by: Mahmod, Ramlan, et al.
Published: (2010)
Writing a literature review (in Arabic)
by: Sahrir, Muhammad Sabri
Published: (2015)
by: Sahrir, Muhammad Sabri
Published: (2015)
An antonym substitution-based model on linguistic steganography method
by: Mansor, Fawwaz Zamir, et al.
Published: (2018)
by: Mansor, Fawwaz Zamir, et al.
Published: (2018)
Camera-based vehicle recognition methods and techniques : Systematic literature review
by: Nor'Aqilah, Misman, et al.
Published: (2018)
by: Nor'Aqilah, Misman, et al.
Published: (2018)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Similar Items
-
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011) -
Primitive structural method for high capacity text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2014) -
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018) -
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020) -
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)