Abstract: In this study combination of lossless compression techniques and Vigenere cipher was used in the e-mail based text steganography. It makes use of email addresses to be the keys to embed/to extract the secret message into/from the email text (cover text). After selecting the cover text that has highest repetition pattern regarding to the secret message the distance matrix was formed. The members of distance matrix were compressed by following lossless compression algorithms as in written sequence; Run Length Encoding (RLE) + Burrows Wheeler Transform (BWT) + Move to Front (MTF) + Run Length Encoding (RLE) + Arithmetic Encoding (ARI). Later on Latin Square was used to form stego key 1and then Vigenere cipher was used to increase com...
The art of information hiding has received lots of attention in the recent years as security of info...
Abstract:- Sending encrypted messages frequently will draw the attention of third parties, i.e. crac...
This paper presents three novel approaches of text steganography. The first approach uses the theme ...
In this paper, capacity and security issues of text steganography have been considered by employing ...
AbstractIn this paper, capacity and security issues of text steganography have been considered by em...
Current techniques of steganography are not impervious to detection using thorough procedures. This ...
Abstract: In all over the world maintain the security of the secret data has been a great challenge....
Abstract: Steganography is fetching attraction because of rapid growth & use of internet as a co...
Increase in the number of attack recorded during electronic exchange of information between the sour...
Steganography and cryptography are methods in information hiding. Cryptography scrambles the secret ...
Steganography is the art of hiding of a message within another so that presence of hidden message is...
Encrypted messages sending frequently draws the attention of third parties, perhaps causing attempts...
In today’s electronic era, wealth of electronic information are accessing over the Internet. Several...
Transmission of information through a problematic channel for communication assumes an essential job...
Abstract: Now a day’s Steganography plays an important role in defence, public sectors works and int...
The art of information hiding has received lots of attention in the recent years as security of info...
Abstract:- Sending encrypted messages frequently will draw the attention of third parties, i.e. crac...
This paper presents three novel approaches of text steganography. The first approach uses the theme ...
In this paper, capacity and security issues of text steganography have been considered by employing ...
AbstractIn this paper, capacity and security issues of text steganography have been considered by em...
Current techniques of steganography are not impervious to detection using thorough procedures. This ...
Abstract: In all over the world maintain the security of the secret data has been a great challenge....
Abstract: Steganography is fetching attraction because of rapid growth & use of internet as a co...
Increase in the number of attack recorded during electronic exchange of information between the sour...
Steganography and cryptography are methods in information hiding. Cryptography scrambles the secret ...
Steganography is the art of hiding of a message within another so that presence of hidden message is...
Encrypted messages sending frequently draws the attention of third parties, perhaps causing attempts...
In today’s electronic era, wealth of electronic information are accessing over the Internet. Several...
Transmission of information through a problematic channel for communication assumes an essential job...
Abstract: Now a day’s Steganography plays an important role in defence, public sectors works and int...
The art of information hiding has received lots of attention in the recent years as security of info...
Abstract:- Sending encrypted messages frequently will draw the attention of third parties, i.e. crac...
This paper presents three novel approaches of text steganography. The first approach uses the theme ...