[PDF][PDF] A novel method to protect content of microsoft word document using cryptography and steganography

MA Mohamed, OG Altrafi, MO Ismail… - International Journal of …, 2015 - academia.edu
Microsoft Word is the most famous and popular word processor in the world nowadays and
the last versions of it depend on eXtended Markup Language (XML) by using Open Office …

Proposed Data Hiding Technique–Text under Text

YF Abdullah, H HO Nasereddin - American Academic & Scholarly …, 2013 - aasrc.org
There are many methods used for data hiding like image, audio and text. Data hiding in text
is embedding text within another text to be unreadable. Open space methods used for data …

[PDF][PDF] Enhancing Open Space Method in Data Hiding

HHO Nasereddin, YF Abdullah - International Journal of …, 2016 - researchgate.net
This research studies a methodology for hide data within different texts. That is where the
data masking process is one of the areas of information security to hide and encrypt data …

[PDF][PDF] Data Hiding Text under Text by using Hexadecimal Algorithm

HHO Nasereddin, YF Abdullah, DYS JALLAD - researchgate.net
This research studies a methodology for hide data within different texts. That is where the
data masking process is one of the areas of information security to hide and encrypt data …

Doc-Trace: Tracing Secret Documents in Cloud Computing via Steganographic Marking

SH Choi, J Yun, KW Park - IEICE TRANSACTIONS on Information …, 2017 - search.ieice.org
The secret document leakage incidents have raised awareness for the need to better
security mechanisms. A leading cause of the incidents has been due to accidental …

Steganography Techniques for Arabic Language Texts Utilizing Single-Double Quotation Using RNG

APDHM Ahmed - Journal of the College of Basic …, 2016 - cbej.uomustansiriyah.edu.iq
Steganography is known as the art and technique of text messages concealed in such a
manner that one apart from the meant recipient defines the message presence. Because of …

[PDF][PDF] 복합문서파일에은닉된데이터탐지기법에대한연구

김은광, 전상준, 한재혁, 이민욱, 이상진 - 정보보호학회논문지, 2015 - researchgate.net
요 약기존 데이터 은닉은 대용량 멀티미디어 파일에 데이터를 삽입하는 방식으로 이루어졌다.
하지만 최근 Microsoft Office 2003 이하 버전 제품의 문서파일은 구조가 파일시스템과 …

[PDF][PDF] Year of Publication: 2016

HHO Nasereddin, YF Abdullah - 2016 - academia.edu
This research studies a methodology for hide data within different texts. That is where the
data masking process is one of the areas of information security to hide and encrypt data …

[PDF][PDF] Enhancing Open Space Method in Data Hiding Technique–Text under Text

YFI Abdallah - 2013 - researchgate.net
Information security has two branches; data encryption and data hiding (DH). Data
encryption is masking the data to become meaningless, while data hiding is concerned with …

[引用][C] An effective detection method for hiding data in compound-document files

EK Kim, SJ Jeon, JH Han… - Journal of the …, 2015 - Korea Institute of Information …