Primitive structural method for high capacity text steganography
High capacity for hiding secret information is typically the main concern in text steganography, as well as robustness and perceptual invisibility in a perfect steganography algorithm. The major issue in text steganography is the difficulty of using a large amount of redundant information to hide se...
| Main Authors: | Roslan, Nuur Alifah, Mahmod, Ramlan, Udzir, Nur Izura, Ahmad Zulkarnain, Zuriati |
|---|---|
| Format: | Article |
| Published: |
Asian Research Publication Network
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/35053/ |
Similar Items
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022)
by: Roslan, Nuur Alifah, et al.
Published: (2022)
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)
by: Roslan, Nuur Alifah, et al.
Published: (2020)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)
by: Roslan, Nuur Alifah
Published: (2011)
Traid-bit embedding process on Arabic text steganography method
by: Din, Roshidi, et al.
Published: (2021)
by: Din, Roshidi, et al.
Published: (2021)
CSNTSteg: color spacing normalization text steganography model to improve capacity and invisibility of hidden data
by: Thabit, Reema, et al.
Published: (2022)
by: Thabit, Reema, et al.
Published: (2022)
Enhancing secure QR code steganography through artificial intelligence: a conceptual framework
by: Roslan, Nuur Alifah, et al.
Published: (2025)
by: Roslan, Nuur Alifah, et al.
Published: (2025)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
The evaluation performance of letter-based techniques on text steganography method
by: Ismail, Azizan, et al.
Published: (2018)
by: Ismail, Azizan, et al.
Published: (2018)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Fast decryption method for a Rabin primitive-based cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
A novel text steganography technique to Arabic language using reverse fatah
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Tangani salah guna AI
by: Roslan, Nuur Alifah
Published: (2024)
by: Roslan, Nuur Alifah
Published: (2024)
Teknologi AI bakal kuasai karya digital
by: Roslan, Nuur Alifah
Published: (2023)
by: Roslan, Nuur Alifah
Published: (2023)
Pertahan hak kebebasan digital
by: Roslan, Nuur Alifah
Published: (2024)
by: Roslan, Nuur Alifah
Published: (2024)
Pharmacological relevance of primitive leafy Cactuses
Pereskia
by: M., Sharif K., et al.
Published: (2013)
by: M., Sharif K., et al.
Published: (2013)
Fossil musculature of the most primitive jawed vertebrates
by: Trinajstic, Kate, et al.
Published: (2013)
by: Trinajstic, Kate, et al.
Published: (2013)
The origins, development and significance of the circuit in Wesleyan and primitive Methodism in England 1740-1914
by: Pocock, Christine Margaret
Published: (2015)
by: Pocock, Christine Margaret
Published: (2015)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Image steganography
by: Jeniffer, Chegaram
Published: (2012)
by: Jeniffer, Chegaram
Published: (2012)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
The application of stochastic design strategies to primitive and complex shapes
by: Groth, Jan-Hendrik
Published: (2023)
by: Groth, Jan-Hendrik
Published: (2023)
Pancreatic primitive neuroectodermal tumour associated with precocious puberty.
by: Menon, Bina Sharine, et al.
Published: (2009)
by: Menon, Bina Sharine, et al.
Published: (2009)
The mathematics of 3D buffering for simple geospatial primitives
by: Chen, Tet Khuan, et al.
Published: (2003)
by: Chen, Tet Khuan, et al.
Published: (2003)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Enhancing image-emoji graphical password multi-factor authentication by utilizing single touch and multi-touch gesture
by: Roslan, Nuur Alifah, et al.
Published: (2024)
by: Roslan, Nuur Alifah, et al.
Published: (2024)
System and method of transforming text into image for information hiding
by: Mahmod, Ramlan, et al.
Published: (2010)
by: Mahmod, Ramlan, et al.
Published: (2010)
Method and system for steganography within handwritten signature images
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
An antonym substitution-based model on linguistic steganography method
by: Mansor, Fawwaz Zamir, et al.
Published: (2018)
by: Mansor, Fawwaz Zamir, et al.
Published: (2018)
Similar Items
-
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011) -
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022) -
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020) -
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018) -
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)