[HTML][HTML] Systematic literature review and analysis for Arabic text steganography method practically
Despite the rapidly growing studies on Arabic text steganography (ATS) noted recently;
systematic, in-depth, and critical reviews are in scarcity due to high overlap or low …
systematic, in-depth, and critical reviews are in scarcity due to high overlap or low …
[HTML][HTML] A comparative analysis of arabic text steganography
Protecting sensitive information transmitted via public channels is a significant issue faced
by governments, militaries, organizations, and individuals. Steganography protects the …
by governments, militaries, organizations, and individuals. Steganography protects the …
CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data
The rapid growth of online communication has increased the demand for secure
communication. Most government entities, healthcare providers, the legal sector, financial …
communication. Most government entities, healthcare providers, the legal sector, financial …
[PDF][PDF] A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography.
Securing images can be achieved using cryptography and steganography. Combining both
techniques can improve the security of images. Usually, Arnold's transformation (ACM) is …
techniques can improve the security of images. Usually, Arnold's transformation (ACM) is …
[PDF][PDF] Covertext generation using fuzzy logic approach in parallel encryption with digit arithmetic of covertext to improve information confidentiality
The sophistication of the Internet provides fast and easy information transfer. When passing
through an open channel, keeping information confidential becomes important to be well …
through an open channel, keeping information confidential becomes important to be well …
Traid-bit embedding process on Arabic text steganography method
The enormous development in the utilization of the Internet has driven by a continuous
improvement in the region of security. The enhancement of the security embedded …
improvement in the region of security. The enhancement of the security embedded …
[HTML][HTML] Contributions to Image Transmission in Icing Conditions on Unmanned Aerial Vehicles
JE Rodríguez Marco, M Sánchez Rubio… - Drones, 2023 - mdpi.com
In terms of manned aircraft, pilots usually detect icing conditions by visual cues or by means
of ice detector systems. If one of these cues is seen by the crew or systems detect icing …
of ice detector systems. If one of these cues is seen by the crew or systems detect icing …
Applying encryption algorithm on text steganography based on number system
Nowadays as there is huge transfer of information throughout the world so there are
adequate chances of leakage of information. Standard algorithms fail to protect …
adequate chances of leakage of information. Standard algorithms fail to protect …
[PDF][PDF] Secure Communication by combined Diffe-Hellman key exchange Based AES Encryption and Arabic Text Steganography.
FRS Taka - J. Inf. Hiding Multim. Signal Process., 2021 - bit.nkust.edu.tw
In this paper, the model of security is suggested which emphasize the notion of security over
privacy for texting. During the previous few years, we have lot of tools for security that have …
privacy for texting. During the previous few years, we have lot of tools for security that have …
[PDF][PDF] Quantum audio steganography system
AA Abdullah, YK Abbas - Journal of Engineering science and …, 2020 - jestec.taylors.edu.my
The increasing reliance on the internet as a means for data transferring among distributed
parties in the world makes keeping the security of these data an essential manner. In order …
parties in the world makes keeping the security of these data an essential manner. In order …