2022
DOI: 10.1016/j.jksuci.2020.04.011
|View full text |Cite
|
Sign up to set email alerts
|

Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 21 publications
(17 citation statements)
references
References 17 publications
0
14
0
Order By: Relevance
“…The merger of counting-based secret sharing and kashida that was recently presented by the authors of [113] hides the secret sharing bits within Arabic text using kashida. Recently, Medium Mathematical Spaces (MSPs), ZWJ, JWJN and kashida were united [114] to protect the secret bits. The study hid one secret bit by changing format or including one whitespace or kashida.…”
Section: Hybrid Approachmentioning
confidence: 99%
See 3 more Smart Citations
“…The merger of counting-based secret sharing and kashida that was recently presented by the authors of [113] hides the secret sharing bits within Arabic text using kashida. Recently, Medium Mathematical Spaces (MSPs), ZWJ, JWJN and kashida were united [114] to protect the secret bits. The study hid one secret bit by changing format or including one whitespace or kashida.…”
Section: Hybrid Approachmentioning
confidence: 99%
“…Stego file size increases by inserting kashida. [114] Multi types of whitespace are combined with kashida.…”
Section: Authorsmentioning
confidence: 99%
See 2 more Smart Citations
“…This observation inspired us to propose a new scheme that utilizes the ENMI interpolation technique to generate the cover images and embeds the data using a new embedding technique that combines the embedding methods of Lee and Huang [23] and Malik et al [29]. Additionally, we replace the used simple LSB substitution method in Malik et al's [29] scheme by the OPAP method [8] to enhance the image quality, making this research completely different than other steganography research [1,13] as well as the combined stego counting based secret sharing [12,14]. Our proposed scheme scores the best embedding capacity among Jung and Yoo [21], Lee and Huang [23], Chang et al [9], Malik et al [29] and Zhang et al [38] with better image quality than four of them, i.e.…”
Section: Review Of Existing Interpolation-based Rdh Schemesmentioning
confidence: 99%