Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes
Data communication over the Internet has increased significantly, resulting in high data traffic and concerns over data security. Information sent over the Internet always gets the attention of intruders, which causes the effort to increase the security of sensitive data and the need to prevent leak...
Main Authors: | Osman, Baharudin, Yahya, Noor Izzah, Mohd Zaini, Khuzairi, Abdullah, Azizol |
---|---|
Format: | Article |
Language: | English |
Published: |
UUM Press
2023
|
Subjects: | |
Online Access: | https://repo.uum.edu.my/id/eprint/29742/1/JCIA%2002%2001%202023%2021-40.pdf https://doi.org/10.32890/jcia2023.2.1.2 |
Similar Items
-
Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
by: Wong, Tze Jin, et al.
Published: (2019) -
An analysis of alphabet-based techniques in text steganography
by: Osman, Baharudin, et al.
Published: (2016) -
Capacity performance of steganography method in text based domain
by: Osman, Baharudin, et al.
Published: (2015) -
A performance of embedding process for text steganography method
by: Osman, Baharudin, et al.
Published: (2013) -
Analysis Review on Performance Metrics for Extraction Schemes in Text Steganography
by: Sabri, Raihan Sabirah, et al.