Easy to search. Easy to read. Easy to cite with credible sources.
A.A. Zaidan, B.B. Zaidan, Ali K. Al-Fraja and Hamid A. Jalab
Journal of Applied Sciences, 2010, 10(17), 1916-1922.
The aim of this study is to investigate the methods of steganography using the text file as a cover carrier. The hiding data or Steganography is the art of protecting the information by embedding data in medium carrier, for instants this study illustrates historically this art. The steganography technique has been used mainly to hide secret data within multimedia files and one of used files to hide secret data is the text files. In this study, we have proposed the steganography methods using the text files as a review. The study restricts the weak points of this art by hiding information in text file. As a result of this study, the text based steganography has been discussed and the advantages and disadvantages of using the text file as a cover carrier for steganography has been proposed.
ASCI-ID: 35-3590
Journal of Applied Sciences, 2010, 10(1), 59-64.
On the Capacity and Security of Steganography Approaches: An OverviewJournal of Applied Sciences, 2010, 10(16), 1825-1833.
Hiding Data in Video File: An OverviewJournal of Applied Sciences, 2010, 10(15), 1644-1649.
On the Differences between Hiding Information and Cryptography Techniques: An OverviewJournal of Applied Sciences, 2010, 10(15), 1650-1655.
A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic AlgorithmJournal of Applied Sciences, 2010, 10(1), 59-64.
On the Capacity and Security of Steganography Approaches: An OverviewJournal of Applied Sciences, 2010, 10(16), 1825-1833.
On the Differences between Hiding Information and Cryptography Techniques: An OverviewJournal of Applied Sciences, 2010, 10(15), 1650-1655.
Hiding Data in Video File: An OverviewJournal of Applied Sciences, 2010, 10(15), 1644-1649.
An Overview on Hiding Information Technique in ImagesJournal of Applied Sciences, 2010, 10(18), 2094-2100.
Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGAJournal of Applied Sciences, 2012, 12(3), 201-210.
Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for StegoJournal of Applied Sciences, 2012, 12(5), 428-439.
Sub Carriers Carry Secret: An Absolute Stego ApproachJournal of Applied Sciences, 2014, 14(15), 1728-1735.
Coded Crypted Converted Hiding (C3H)-A Stego ChannelJournal of Applied Sciences, 2014, 14(16), 1786-1797.
Adaptive Data Hiding Based on Visual CryptographyJournal of Applied Sciences, 2014, 14(15), 1674-1688.
Random Image Steganography using Pixel Indicator to Enhance Hiding CapacityJournal of Applied Sciences, 2014, 14(16), 1798-1808.
Multi (Carrier+Modulator) Adaptive System-an Anti Fading Stego ApproachJournal of Applied Sciences, 2014, 14(16), 1836-1843.
International Journal of Pharmacology, 2010, 6(6), 954. DOI: 10.3923/ijp.2010.954.958
Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert ConcernsInternational Journal of Pharmacology, 2011, 7(3), 382. DOI: 10.3923/ijp.2011.382.387
High Watermarking Capacity Based on Spatial Domain TechniqueInformation Technology Journal, 2011, 10(7), 1367. DOI: 10.3923/itj.2011.1367.1373
A Review on Multimedia Communications CryptographyResearch Journal of Information Technology, 2011, 3(3), 146. DOI: 10.3923/rjit.2011.146.152
Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysisHealth and Technology, 2018, (), . DOI: 10.1007/s12553-018-0278-7
Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic ReviewJournal of Medical Systems, 2019, 43(2), . DOI: 10.1007/s10916-018-1149-5
Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic ReviewJournal of Medical Systems, 2019, 43(3), . DOI: 10.1007/s10916-019-1158-z
Based Medical Systems for Patient’s Authentication: Towards a New Verification Secure Framework Using CIA StandardJournal of Medical Systems, 2019, 43(7), . DOI: 10.1007/s10916-019-1264-y
Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authenticationComputer Standards & Interfaces, 2019, (), 103343. DOI: 10.1016/j.csi.2019.04.002
New Method of Image Steganography Based on Particle Swarm Optimization Algorithm in Spatial Domain for High Embedding CapacityIEEE Access, 2019, 7(), 168994. DOI: 10.1109/ACCESS.2019.2949622
Finger Vein Biometrics: Taxonomy Analysis, Open Challenges, Future Directions, and Recommended Solution for Decentralised Network ArchitecturesIEEE Access, 2020, 8(), 9821. DOI: 10.1109/ACCESS.2020.2964788
A High-Capacity Image Steganography Method Using Chaotic Particle Swarm OptimizationSecurity and Communication Networks, 2021, 2021(), 1. DOI: 10.1155/2021/6679284
PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architectureMultimedia Tools and Applications, 2021, (), . DOI: 10.1007/s11042-020-10284-y