Abstract – The massive amount of data transfer over internet raises different challenges such as channel types, transmission time and data security. In this paper, we present a novel secure algorithm to hide the data inside document files, where four symbols are used to embed the data inside the carrier file. The main process depends on a key to produce a symbol table and match the data to be hidden with the representative symbols. This method can be extended to any language and does not change the file format. In addition, the capacity ratio of the presented algorithm is high compared to other algorithms
Secure communication is essential for data confidentiality and integrity especially with the massive...
This paper presents three novel approaches of text steganography. The first approach uses the theme ...
Steganography describes a variety of techniques in which a ‘secret’ message is hidden ‘within’ some ...
Abstract –With the rapid growth of networking mechanisms, where large amount of data can be transfer...
© ASEE 2013With the rapid growth of networking mechanisms, where large amount of data can be transfe...
oai::article/406Steganography develops tools and methods for hiding the fact of message transmission...
Steganography can be defined as the art and science of hiding information in the data that could be ...
The aim of this study is to investigate the methods of steganography using the text file as a cover ...
With the rapid development of Internet, safe covert communications in the network environment become...
The widespread adoption of electronic distribution of material is accompanied by illicit copying and...
There has been a persistent requirement for safeguarding documents and the data they contain, either...
In a very less time internet has got heights. In every organization internet is the main employee wi...
In today’s electronic era, wealth of electronic information are accessing over the Internet. Several...
While data encryption is an effective means of keeping data private it does not conceal the presence...
The security of information is regarded as one of the biggest issues in communication to safeguard i...
Secure communication is essential for data confidentiality and integrity especially with the massive...
This paper presents three novel approaches of text steganography. The first approach uses the theme ...
Steganography describes a variety of techniques in which a ‘secret’ message is hidden ‘within’ some ...
Abstract –With the rapid growth of networking mechanisms, where large amount of data can be transfer...
© ASEE 2013With the rapid growth of networking mechanisms, where large amount of data can be transfe...
oai::article/406Steganography develops tools and methods for hiding the fact of message transmission...
Steganography can be defined as the art and science of hiding information in the data that could be ...
The aim of this study is to investigate the methods of steganography using the text file as a cover ...
With the rapid development of Internet, safe covert communications in the network environment become...
The widespread adoption of electronic distribution of material is accompanied by illicit copying and...
There has been a persistent requirement for safeguarding documents and the data they contain, either...
In a very less time internet has got heights. In every organization internet is the main employee wi...
In today’s electronic era, wealth of electronic information are accessing over the Internet. Several...
While data encryption is an effective means of keeping data private it does not conceal the presence...
The security of information is regarded as one of the biggest issues in communication to safeguard i...
Secure communication is essential for data confidentiality and integrity especially with the massive...
This paper presents three novel approaches of text steganography. The first approach uses the theme ...
Steganography describes a variety of techniques in which a ‘secret’ message is hidden ‘within’ some ...