[HTML][HTML] A high capacity algorithm for information hiding in Arabic text

A Taha, AS Hammad, MM Selim - … of King Saud University-Computer and …, 2020 - Elsevier
Recently, the need for digital communication has increased greatly. As a result, the Internet
has become the most economical and speedy medium of communication today …

A blockchain-based scheme for sybil attack detection in underwater wireless sensor networks

MM Arifeen, A Al Mamun, T Ahmed, MS Kaiser… - … Conference on Trends …, 2021 - Springer
Underwater wireless sensor network (UWSN) has become popular because of its diverse
applications and massive improvements in sensing technologies in recent years. However …

Tamilian cryptography: an efficient hybrid symmetric key encryption algorithm

R Geetha, T Padmavathy, T Thilagam… - Wireless Personal …, 2020 - Springer
Cryptography is one of the most accepted and successful data security methods used at
present by most of the organizations. Encrypting the message using natural languages …

A two-layer image-steganography system for covert communication over enterprise network

AJ Gabriel, AO Adetunmbi, P Obaila - … Conference, Cagliari, Italy, July 1–4 …, 2020 - Springer
Computers find application in virtually all aspect of human existence, especially in today's
modern world. Although this comes with a lot of benefits, it also comes with a number of …

Recent trends in text steganography with experimental study

R Kumar, H Singh - Handbook of Computer Networks and Cyber Security …, 2020 - Springer
There have been pressing needs for securing a document and its content, either in
electronic form or printed form. This is because counterfeiting and forgeries are extremely …

[PDF][PDF] New text steganography technique based on a set of two-letter words

SS Baawi, MR Mokhtar, R Sulaiman - Journal of Theoretical and …, 2017 - researchgate.net
Steganography is a secret writing wherein one person communicates with another without
drawing suspicion to the secret communication through the medium. Text steganography is …

[PDF][PDF] An Image Steganography Scheme Using 3D-Sudoku.

B Xia, A Wang, CC Chang, L Liu - J. Inf. Hiding Multim. Signal …, 2016 - academia.edu
Steganography, an information-hiding technique, is that embedding secret information into a
cover-media to generate a meaningful stego-media. This paper proposes a novel image …

Improvement of “text steganography based on unicode of characters in multilingual” by custom font with special properties

SS Baawi, DA Nasrawi - IOP Conference Series: Materials …, 2020 - iopscience.iop.org
Since computer utilization is expanding, for both social and trade ranges, secure
communications through channels got to be an exceptionally critical issue. Information …

Enhanced pixel value differencing with cryptography algorithm

R Rahim, N Kurniasih, F Handayanna… - MATEC Web of …, 2018 - matec-conferences.org
The combination of Steganography and cryptography algorithms can improve the security of
data you want to keep secret. Pixel Value Differencing (PVD) algorithm combined with Word …

Telugu DNA for Safe Delivery: A Secured Text Communication

S Aashiqbanu, B Krishna Murthy, G Bindu Sai… - Wireless Personal …, 2022 - Springer
Data breaches are security conflicts in which information is assessed without authorisation.
Encrypting the information using legitimate languages is an efficient method for securing it …