Hamdan et al., 2016 - Google Patents
AH4S: an algorithm of text in text steganography using the structure of omega networkHamdan et al., 2016
View PDF- Document ID
- 15296973206045850442
- Author
- Hamdan A
- Hamarsheh A
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
This article introduces a new technique to hide text‐in‐text messages. The proposed mechanism uses the structure of omega network to hide and extract secret messages. The generation of secret message is made as follows, take every letter from the original …
- 238000000034 method 0 abstract description 53
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hamdan et al. | AH4S: an algorithm of text in text steganography using the structure of omega network | |
Rizzo et al. | Fine-grain watermarking for intellectual property protection | |
Malik et al. | A high capacity text steganography scheme based on LZW compression and color coding | |
Naqvi et al. | Multilayer partially homomorphic encryption text steganography (MLPHE-TS): a zero steganography approach | |
Camara et al. | Distortion‐Free Watermarking Approach for Relational Database Integrity Checking | |
US20150312039A1 (en) | Behavioral fingerprint in a white-box implementation | |
Raikhlin et al. | Is it possible to reduce the sizes of stegomessages in associative steganography? | |
Rahman et al. | Robust and fragile medical image watermarking: a joint venture of coding and chaos theories | |
Ramakrishnan et al. | Text steganography: a novel character‐level embedding algorithm using font attribute | |
Urbanovich et al. | Theoretical Model of a Multi-Key Steganography System | |
Moyou Metcheka et al. | Distributed data hiding in multi-cloud storage environment | |
EP2960891B1 (en) | Method for introducing dependence of white-box implementationon a set of strings | |
Kaushik et al. | Zero-width text steganography in cybercrime attacks | |
Iftikhar et al. | A survey on reversible watermarking techniques for relational databases | |
Ivasenko et al. | Information Transmission Protection Using Linguistic Steganography With Arithmetic Encoding And Decoding Approach | |
Rafat et al. | Secure digital steganography for ASCII text documents | |
KR101584127B1 (en) | System and method for deniable encryption | |
Alsaadi et al. | Text steganography in font color of MS excel sheet | |
US20150372989A1 (en) | Method for introducing dependence of white-box implementation on a set of strings | |
EP2940917B1 (en) | Behavioral fingerprint in a white-box implementation | |
Wu et al. | Authentication of LINE chat history files by information hiding | |
Azeem et al. | A novel approach to secret data concealment with high cover text capacity and security | |
Ahvanooey et al. | CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks | |
Panwar et al. | Text Steganography Based on Parallel Encryption Using Cover Text (PECT) | |
Saniei et al. | The Security of Arithmetic Compression Based Text Steganography Method |