Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Systematic literature review and analysis for Arabic text steganography method practically
Despite the rapidly growing studies on Arabic text steganography (ATS) noted recently;
systematic, in-depth, and critical reviews are in scarcity due to high overlap or low …
systematic, in-depth, and critical reviews are in scarcity due to high overlap or low …
A comparative analysis of arabic text steganography
Protecting sensitive information transmitted via public channels is a significant issue faced
by governments, militaries, organizations, and individuals. Steganography protects the …
by governments, militaries, organizations, and individuals. Steganography protects the …
Hiding shares of counting-based secret sharing via Arabic text steganography for personal usage
A Gutub, K Alaseri - Arabian Journal for Science and Engineering, 2020 - Springer
This paper presented new models to hide sensitive data via Arabic text steganography. The
models are structured to serve personal remembrance of secret shares to be used within …
models are structured to serve personal remembrance of secret shares to be used within …
Text steganographic approaches: a comparison
M Agarwal - arxiv preprint arxiv:1302.2718, 2013 - arxiv.org
This paper presents three novel approaches of text steganography. The first approach uses
the theme of missing letter puzzle where each character of message is hidden by missing …
the theme of missing letter puzzle where each character of message is hidden by missing …
Arabic text steganography based on deep learning methods
OFA Adeeb, SJ Kabudian - IEEE Access, 2022 - ieeexplore.ieee.org
Steganography is one of the oldest methods for securely sending and transferring secret
information between two people without raising suspicion. Recently, the use of Artificial …
information between two people without raising suspicion. Recently, the use of Artificial …
[HTML][HTML] Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing
AAA Gutub, KA Alaseri - Journal of King Saud University-Computer and …, 2021 - Elsevier
Sensitive information requires many security systems to be protected by secret keys. One of
these practical security systems is the so-called counting-based secret sharing, in which …
these practical security systems is the so-called counting-based secret sharing, in which …
[HTML][HTML] Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces
Steganography is the process of hiding data within multimedia communication between
parties by embedding the secret data inside a carrier file to be protected during its …
parties by embedding the secret data inside a carrier file to be protected during its …
Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding
Steganography is the science of hiding information messages in groups of irrelevant data
possibly of another form. Despite of several Arabic text steganography techniques that have …
possibly of another form. Despite of several Arabic text steganography techniques that have …
Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications
SMA Al-Nofaie, AAA Gutub - Multimedia Tools and Applications, 2020 - Springer
Steganography is used for multimedia data security. It is a process of hiding the data within
multimedia communication between the parties embedding the secret data inside a carrier …
multimedia communication between the parties embedding the secret data inside a carrier …
[HTML][HTML] Inclusion of unicode standard seamless characters to expand Arabic text steganography for secure individual uses
The need to protect confidential data stored on personal computers (PCs) or sent to other
parties has increased significantly. Therefore, a secure, high-capacity strategy is needed to …
parties has increased significantly. Therefore, a secure, high-capacity strategy is needed to …