inference rules and traditional Sobel method, a method is presented for edge detection in digital images with noise. In the proposed method, at first an image is scanned by a 2 × 2 mask and at each step of the survey 4 pixels are sent to... more
In this work, the author constructs a key access management scheme that seamlessly transitions any hierarchical-like access policy to the digital medium. The proposed scheme allows any public cloud system to be used as a private cloud. We... more
ABSTRACT: Digital watermarking is the art of embedding data, called a watermark, into a multimedia object such that the watermark can be detected or extracted later without impairing the object. Concealment of secret messages inside a... more
With the growing misuse of digital communication platforms, cybercriminals have started embedding malicious or deceptive messages within images using steganography, particularly through Least Significant Bit (LSB) techniques. Traditional... more
A secure LSB method of message steganography will be introduced, this method will use a private key of 256 bits length, this length will provide the required key space to protect the hidden message from being hacked, the private key will... more
One of the main aspects on embedding process of any text steganography methods is the capacity text.It is because a better embedding ratio and saving space offers; a more text can be hidden.This study tries to evaluate several format... more
One of the main aspects on embedding process of any text steganography methods is the capacity text. It is because a better embedding ratio and saving space offers; a more text can be hidden. This paper tries to evaluate several format... more
In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP). The main objective of this paper is to detect the existence of... more
Abstract:-This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java... more
In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP). The main objective of this paper is to detect the existence of... more
Text steganography is crucial in information security due to the limited redundancy in text. The Arabic language features offer a new method for data concealment. In this paper, the researchers propose a new coverless text information... more
In the digital era, protecting confidential information from unauthorized access is crucial. Information can be represented through a variety of communicative media, including text, video, audio, and images, with text being the most... more
Modern text hiding is an intelligent programming technique which embeds a secret message/watermark into a cover text message/file in a hidden way to protect confidential information. Recently, text hiding in the form of watermarking and... more
The field of linguistic steganography studies systems which are able to encode secret messages in existing cover texts themselves. The primary focus of these systems is to provide users the ability to communicate encrypted messages... more
This paper proposes an approach to implement public key algorithm in Steganography. Here, in this paper, Public key algorithm is used based on RSA assumptions with traditional LSB modification scheme for Steganography to randomize the... more
Steganography techniques are concerned with hiding the existence of data in other cover media. Today, text steganography has become particularly popular. This paper presents a new idea for using Arabic text in steganography. The main idea... more
Recently perfectly secure steganographic systems have been described for a wide class of sources of covertexts. The speed of transmission of secret information for these stegosystems is proportional to the length of the covertext. In this... more
The need to hide essential information has rapidly increased as mobile devices and the internet has overgrown. Steganography is a method created to create hidden communication. Recently, methods have been developed to hide important... more
Using OCR programs is one of the best ways to convert written and printed documents into digital form. The first phase in OCR is segmenting the input image and identifying text and non-text regions. This paper proposes a new method for... more
In this paper, a novel watermarking technique for the tamper detection of text images is pro- posed. Entropy of every sentence is computed and Markov matrix using the occurrences of the characters is used to generate a character pattern.... more
The current online digital world, consisting of thousands of newspapers, blogs, social media, and cloud file sharing services, is providing easy and unlimited access to a large treasure of text contents. Making copies of these text... more
During the recent years, the issue of preserving the integrity of digital text has become a focus of interest in the transmission of online content on the Internet. Watermarking has a useful tool in the protection of digital text content... more
The need to hide essential information has rapidly increased as mobile devices and the internet has overgrown. Steganography is a method created to create hidden communication. Recently, methods have been developed to hide important... more
The need to hide essential information has rapidly increased as mobile devices and the internet has overgrown. Steganography is a method created to create hidden communication. Recently, methods have been developed to hide important... more
Cloud computing provides a lot of shareable resources payable on demand to the users. The drawback with cloud computing is the security challenges since the data in the cloud are managed by third party. Steganography and cryptography are... more
Objectives: Steganography is a technique for hiding data in sensitive applications such as banking and legal fields. With Steganography the secret information can be passed without any suspicion. Methods Analysis: Text Steganography embed... more
The rapid growth of online communication has increased the demand for secure communication. Most government entities, healthcare providers, the legal sector, financial and banking, and other industries are vulnerable to information... more
Transmission of documents in an e-learning system should be in a very secure manner; otherwise, if the hacker can reach the documents, they can edit or destroy the documents. In our proposed model, we have used the Least Significant Bit... more
In an e-Learning environment, the communication between sender and receiver has been done via Internet. In general, while the sender sends their important documents to receiver through Internet, he/she encrypts the document which is... more
The widespread adoption of electronic distribution of material is accompanied by illicit copying and distribution. This is why individuals, businesses and governments have come to think of how to protect their work, prevent such illicit... more
Additive Manufacturing (AM) adoption is increasing in home and industrial settings, but information security for this technology is still immature. Thus far, three security threat categories have been identified: technical data theft,... more
New steganography methods are being proposed to embed secret information into text cover media in order to search for new possibilities employing languages other than English. This paper utilizes the advantages of diacritics in Arabic to... more
This paper presented new models to hide sensitive data via Arabic text steganography. The models are structured to serve personal remembrance of secret shares to be used within counting-based secret sharing technique. This research hides... more
Steganography is a method of hiding data within a cover media so that other individuals fail to realize their existence. In this paper, a new approach for steganography in Arabic texts is proposed. The main idea is that each Arabic word... more
Steganography is the science of hiding information messages in groups of irrelevant data possibly of another form. Despite of several Arabic text steganography techniques that have been proposed in the literature, there are only limited... more
An improved Arabic text steganography method is proposed. It hides secret data into text cover media in two Diacritics chosen based on highest availability percentage among all Diacritics, which are eight in Arabic language. This... more
Secret Sharing is required in situations where access to important resources has to be protected by more than one person. We propose new secret-sharing scheme that works based on parallel counting of the ones within the shares to generate... more
Steganography is the ability to hide information in a cover media such as text, and pictures. An improved approach is proposed to embed secret into Arabic text cover media using Kashida, an Arabic extension character. The proposed... more
Flexible security system suitable to hide sensitive text-data on personal computer (PC) is proposed and implemented. The system provides security information to the user to select the cover-image within the PC based on his/her security... more
Steganography is the science of hiding secret messages in irrelevant data that is possibly of another form. Despite several Arabic text steganography techniques having been proposed in the literature, there is only a limited amount of... more
Encrypted messages will draw the attention of third parties, leading attempts to break the original messages and disclose it. Obscuring facts and communications can be achieved by concealing the message using a technique called... more
Secret Sharing is required in situations where access to important resources has to be protected by more than one person. We propose new secret-sharing scheme that works based on parallel counting of the ones within the shares to generate... more
Securing private texts to fully prevent any detection, is a technique called Steganography. This research work of Arabic text steganography focuses on improving the hiding secrets within Arabic language text utilizing the redundant... more
Steganography techniques are concerned with hiding the existence of data in other cover media. Today, text steganography has become particularly popular. This paper presents a new idea for using Arabic text in steganography. The main idea... more
Encrypted messages will draw the attention of third parties, leading attempts to break the original messages and disclose it. Obscuring facts and communications can be achieved by concealing the message using a technique called... more
In this paper, we propose a method that exploits justified texts of PDF files to embed secret data. It was designed in such a way as to take advantage of combinatorics to embed a block of a secret message in each cover PDF file text line... more
The weakness of Human Auditory System (HAS) led the audio steganography process to be used in hiding data in the digital sound. Audio steganography is implemented here by using Least Significant Bit (LSB) algorithm to hide message into... more
The need to hide essential information has rapidly increased as mobile devices and the internet has overgrown. Steganography is a method created to create hidden communication. Recently, methods have been developed to hide important... more