Modern text hiding, text steganalysis, and applications: a comparative analysis

M Taleby Ahvanooey, Q Li, J Hou, AR Rajput, Y Chen - Entropy, 2019 - mdpi.com
Modern text hiding is an intelligent programming technique which embeds a secret
message/watermark into a cover text message/file in a hidden way to protect confidential …

ANiTW: A novel intelligent text watermarking technique for forensic identification of spurious information on social media

MT Ahvanooey, Q Li, X Zhu, M Alazab, J Zhang - Computers & Security, 2020 - Elsevier
Digital Watermarking is required in multimedia applications where access to sensitive
information has to be protected against malicious attacks. Since the digital text is one of the …

AITSteg: An innovative text steganography technique for hidden transmission of text message via social media

MT Ahvanooey, Q Li, J Hou, HD Mazraeh… - IEEE Access, 2018 - ieeexplore.ieee.org
With the popularity of smartphones and widespread use of high-speed Internet, social media
has become a vital part of people's daily life. Currently, text messages are used in many …

Efficient watermarking technique for protection and authentication of document images

B Singh, MK Sharma - Multimedia Tools and Applications, 2022 - Springer
In this paper, a hashing based watermarking technique for the protection and authentication
of document image is proposed. Message Digest 5 (MD5) hashing is applied on the cover …

[PDF][PDF] Text-based steganography using Huffman compression and AES encryption algorithm

RH Ali, JM Kadhim - Iraqi Journal of Science, 2021 - iasj.net
In every system of security, to keep important data confidential, we need a high degree of
protection. Steganography can be defined as a way of sending confidential texts through a …

[PDF][PDF] Crowd-based requirement engineering

US Ghanyani, M Murad, W Mahmood - International Journal of …, 2018 - academia.edu
Requirement elicitation through crowdsourcing is trending nowadays and due to its major
benefits, some of the organizations are implementing this idea. Our research paper …

[PDF][PDF] Evaluating the Possibility to Perpetrate Tunneling Attacks Exploiting Short-Message-Service.

S Narteni, I Vaccari, M Mongelli, M Aiello… - J. Internet Serv. Inf …, 2021 - isyou.info
In the cyber-security context, tunneling systems are exploited to bypass network restrictions
to communicate outside of the targeted perimeter, without being detected. Such attacks …

[PDF][PDF] Enhancing Arabic Text Steganography Based on Unicode Features

A Alshamsi, S Albaloushi, M Alkhoori, H Almheiri… - Int. J. Com. Dig …, 2022 - academia.edu
Steganography is a technique used for hiding secret information or data in a text, image,
audio, or video to make it harder for the attackers to detect the hidden information. Many …

Tamper Detection Technique for Text Images based on Vowels and Unicode Zero Length Characters

B Singh, RP Hathwal - Wireless Personal Communications, 2023 - Springer
A novel watermarking technique for the tamper detection of English text images is proposed
in this paper. The frequency of maximum occurring vowel in every sentence is counted and …

Data hiding in whatsapp chats using horoscopes

M Agarwal - AIP Conference Proceedings, 2024 - pubs.aip.org
Steganography uses the technique of espionaging a media object in an another innocent
looking file so that no one can doubt of its existence. Text steganography is a sub domain of …