Sharp-edges method in Arabic text steganography
One of the issues that arise in the text steganography is the capacity of hiding secret bit. Focusing in Arabic text steganography we propose a sharp-edges method to encounter the issue. This new method will hide the secret bits in the sharp-edges for each character in the Arabic text document. The...
| Main Authors: | Roslan, Nuur Alifah, Mahmod, Ramlan, Udzir, Nur Izura |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
JATIT & LLS
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/22528/ http://psasir.upm.edu.my/id/eprint/22528/1/Sharp-edges%20method%20in%20Arabic%20text%20steganography.pdf |
Similar Items
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)
by: Roslan, Nuur Alifah
Published: (2011)
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022)
by: Roslan, Nuur Alifah, et al.
Published: (2022)
Primitive structural method for high capacity text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2014)
by: Roslan, Nuur Alifah, et al.
Published: (2014)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)
by: Roslan, Nuur Alifah, et al.
Published: (2020)
Traid-bit embedding process on Arabic text steganography method
by: Din, Roshidi, et al.
Published: (2021)
by: Din, Roshidi, et al.
Published: (2021)
Enhancing secure QR code steganography through artificial intelligence: a conceptual framework
by: Roslan, Nuur Alifah, et al.
Published: (2025)
by: Roslan, Nuur Alifah, et al.
Published: (2025)
CSNTSteg: color spacing normalization text steganography model to improve capacity and invisibility of hidden data
by: Thabit, Reema, et al.
Published: (2022)
by: Thabit, Reema, et al.
Published: (2022)
A novel text steganography technique to Arabic language using reverse fatah
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Calculation of electric field strengths at a sharp edge
by: Brailsford, David F., et al.
Published: (1968)
by: Brailsford, David F., et al.
Published: (1968)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
The evaluation performance of letter-based techniques on text steganography method
by: Ismail, Azizan, et al.
Published: (2018)
by: Ismail, Azizan, et al.
Published: (2018)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Analysis on 2D mapping for mobile robot on the sharp edges area
by: Mohamad Heerwan, Peeie, et al.
Published: (2024)
by: Mohamad Heerwan, Peeie, et al.
Published: (2024)
Electric field strengths and ion trajectories in sharp-edge field ionization sources
by: Brailsford, David F.
Published: (1970)
by: Brailsford, David F.
Published: (1970)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Experimental investigation of the use of sharp edges for the production of positive ions in field-ionization mass spectrometry
by: Blenkinsop, P.A., et al.
Published: (1968)
by: Blenkinsop, P.A., et al.
Published: (1968)
Tangani salah guna AI
by: Roslan, Nuur Alifah
Published: (2024)
by: Roslan, Nuur Alifah
Published: (2024)
Teknologi AI bakal kuasai karya digital
by: Roslan, Nuur Alifah
Published: (2023)
by: Roslan, Nuur Alifah
Published: (2023)
Pertahan hak kebebasan digital
by: Roslan, Nuur Alifah
Published: (2024)
by: Roslan, Nuur Alifah
Published: (2024)
Arabic text
by: Abuzaraida, Mustafa, et al.
Published: (2015)
by: Abuzaraida, Mustafa, et al.
Published: (2015)
Izzah will stay sharp
by: Paul, Rajes
Published: (2021)
by: Paul, Rajes
Published: (2021)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Image steganography
by: Jeniffer, Chegaram
Published: (2012)
by: Jeniffer, Chegaram
Published: (2012)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Enhancing image-emoji graphical password multi-factor authentication by utilizing single touch and multi-touch gesture
by: Roslan, Nuur Alifah, et al.
Published: (2024)
by: Roslan, Nuur Alifah, et al.
Published: (2024)
System and method of transforming text into image for information hiding
by: Mahmod, Ramlan, et al.
Published: (2010)
by: Mahmod, Ramlan, et al.
Published: (2010)
An antonym substitution-based model on linguistic steganography method
by: Mansor, Fawwaz Zamir, et al.
Published: (2018)
by: Mansor, Fawwaz Zamir, et al.
Published: (2018)
Method and system for steganography within handwritten signature images
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
by: Abd Aziz, Norazah, et al.
Published: (2014)
by: Abd Aziz, Norazah, et al.
Published: (2014)
Bias and consistency of the maximum Sharpe ratio
by: Maller, R., et al.
Published: (2005)
by: Maller, R., et al.
Published: (2005)
Retrofit water systems the SHARPS way
by: Alwi, Sharifah Rafidah Wan, et al.
Published: (2006)
by: Alwi, Sharifah Rafidah Wan, et al.
Published: (2006)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
Information hiding using steganography
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Similar Items
-
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011) -
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022) -
Primitive structural method for high capacity text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2014) -
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018) -
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)