[PDF][PDF] A novel method to protect content of microsoft word document using cryptography and steganography
MA Mohamed, OG Altrafi, MO Ismail… - International Journal of …, 2015 - academia.edu
Microsoft Word is the most famous and popular word processor in the world nowadays and
the last versions of it depend on eXtended Markup Language (XML) by using Open Office …
the last versions of it depend on eXtended Markup Language (XML) by using Open Office …
Proposed Data Hiding Technique–Text under Text
YF Abdullah, H HO Nasereddin - American Academic & Scholarly …, 2013 - aasrc.org
There are many methods used for data hiding like image, audio and text. Data hiding in text
is embedding text within another text to be unreadable. Open space methods used for data …
is embedding text within another text to be unreadable. Open space methods used for data …
[PDF][PDF] Enhancing Open Space Method in Data Hiding
HHO Nasereddin, YF Abdullah - International Journal of …, 2016 - researchgate.net
This research studies a methodology for hide data within different texts. That is where the
data masking process is one of the areas of information security to hide and encrypt data …
data masking process is one of the areas of information security to hide and encrypt data …
[PDF][PDF] Data Hiding Text under Text by using Hexadecimal Algorithm
HHO Nasereddin, YF Abdullah, DYS JALLAD - researchgate.net
This research studies a methodology for hide data within different texts. That is where the
data masking process is one of the areas of information security to hide and encrypt data …
data masking process is one of the areas of information security to hide and encrypt data …
Doc-Trace: Tracing Secret Documents in Cloud Computing via Steganographic Marking
The secret document leakage incidents have raised awareness for the need to better
security mechanisms. A leading cause of the incidents has been due to accidental …
security mechanisms. A leading cause of the incidents has been due to accidental …
Steganography Techniques for Arabic Language Texts Utilizing Single-Double Quotation Using RNG
APDHM Ahmed - Journal of the College of Basic …, 2016 - cbej.uomustansiriyah.edu.iq
Steganography is known as the art and technique of text messages concealed in such a
manner that one apart from the meant recipient defines the message presence. Because of …
manner that one apart from the meant recipient defines the message presence. Because of …
[PDF][PDF] 복합문서파일에은닉된데이터탐지기법에대한연구
김은광, 전상준, 한재혁, 이민욱, 이상진 - 정보보호학회논문지, 2015 - researchgate.net
요 약기존 데이터 은닉은 대용량 멀티미디어 파일에 데이터를 삽입하는 방식으로 이루어졌다.
하지만 최근 Microsoft Office 2003 이하 버전 제품의 문서파일은 구조가 파일시스템과 …
하지만 최근 Microsoft Office 2003 이하 버전 제품의 문서파일은 구조가 파일시스템과 …
[PDF][PDF] Year of Publication: 2016
HHO Nasereddin, YF Abdullah - 2016 - academia.edu
This research studies a methodology for hide data within different texts. That is where the
data masking process is one of the areas of information security to hide and encrypt data …
data masking process is one of the areas of information security to hide and encrypt data …
[PDF][PDF] Enhancing Open Space Method in Data Hiding Technique–Text under Text
YFI Abdallah - 2013 - researchgate.net
Information security has two branches; data encryption and data hiding (DH). Data
encryption is masking the data to become meaningless, while data hiding is concerned with …
encryption is masking the data to become meaningless, while data hiding is concerned with …