Modern text hiding, text steganalysis, and applications: a comparative analysis
Modern text hiding is an intelligent programming technique which embeds a secret
message/watermark into a cover text message/file in a hidden way to protect confidential …
message/watermark into a cover text message/file in a hidden way to protect confidential …
ANiTW: A novel intelligent text watermarking technique for forensic identification of spurious information on social media
Digital Watermarking is required in multimedia applications where access to sensitive
information has to be protected against malicious attacks. Since the digital text is one of the …
information has to be protected against malicious attacks. Since the digital text is one of the …
AITSteg: An innovative text steganography technique for hidden transmission of text message via social media
With the popularity of smartphones and widespread use of high-speed Internet, social media
has become a vital part of people's daily life. Currently, text messages are used in many …
has become a vital part of people's daily life. Currently, text messages are used in many …
Efficient watermarking technique for protection and authentication of document images
B Singh, MK Sharma - Multimedia Tools and Applications, 2022 - Springer
In this paper, a hashing based watermarking technique for the protection and authentication
of document image is proposed. Message Digest 5 (MD5) hashing is applied on the cover …
of document image is proposed. Message Digest 5 (MD5) hashing is applied on the cover …
[PDF][PDF] Text-based steganography using Huffman compression and AES encryption algorithm
In every system of security, to keep important data confidential, we need a high degree of
protection. Steganography can be defined as a way of sending confidential texts through a …
protection. Steganography can be defined as a way of sending confidential texts through a …
[PDF][PDF] Crowd-based requirement engineering
Requirement elicitation through crowdsourcing is trending nowadays and due to its major
benefits, some of the organizations are implementing this idea. Our research paper …
benefits, some of the organizations are implementing this idea. Our research paper …
[PDF][PDF] Evaluating the Possibility to Perpetrate Tunneling Attacks Exploiting Short-Message-Service.
In the cyber-security context, tunneling systems are exploited to bypass network restrictions
to communicate outside of the targeted perimeter, without being detected. Such attacks …
to communicate outside of the targeted perimeter, without being detected. Such attacks …
[PDF][PDF] Enhancing Arabic Text Steganography Based on Unicode Features
A Alshamsi, S Albaloushi, M Alkhoori, H Almheiri… - Int. J. Com. Dig …, 2022 - academia.edu
Steganography is a technique used for hiding secret information or data in a text, image,
audio, or video to make it harder for the attackers to detect the hidden information. Many …
audio, or video to make it harder for the attackers to detect the hidden information. Many …
Tamper Detection Technique for Text Images based on Vowels and Unicode Zero Length Characters
B Singh, RP Hathwal - Wireless Personal Communications, 2023 - Springer
A novel watermarking technique for the tamper detection of English text images is proposed
in this paper. The frequency of maximum occurring vowel in every sentence is counted and …
in this paper. The frequency of maximum occurring vowel in every sentence is counted and …
Data hiding in whatsapp chats using horoscopes
M Agarwal - AIP Conference Proceedings, 2024 - pubs.aip.org
Steganography uses the technique of espionaging a media object in an another innocent
looking file so that no one can doubt of its existence. Text steganography is a sub domain of …
looking file so that no one can doubt of its existence. Text steganography is a sub domain of …