Performance analysis on secured data method in natural language steganography
The rapid amount of exchange information that causes the expansion of the internet during the last decade has motivated that a research in this field. Recently, steganography approaches have received an unexpected attention. Hence, the aim of this paper is to review different performance metric; cov...
Published in: | Bulletin of Electrical Engineering and Informatics |
---|---|
Main Author: | Din R.; Bakar R.; Sabri R.S.; Darus M.Y.; Elias S.J. |
Format: | Article |
Language: | English |
Published: |
Institute of Advanced Engineering and Science
2019
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85065221112&doi=10.11591%2feei.v8i1.1441&partnerID=40&md5=9259ed4d09b5ab0f8a006c82b452be98 |
Similar Items
-
The evaluation performance of letter-based technique on text steganography system
by: Din R.; Bakar R.; Utama S.; Jasmis J.; Elias S.J.
Published: (2019) -
A new model of securing iris authentication using steganography
by: Zainal Abidin Z.; Manaf M.; Shibghatullah A.S.
Published: (2011) -
Secured QR Scanner (SQR) based on Query Method
by: Sabri N.S.A.M.; Mohamed Noor N.; Kasiran Z.
Published: (2023) -
802.11p profile adaptive MAC protocol for non-safety messages on vehicular ad hoc networks
by: Elias S.J.; Elshaikh M.; Darus M.Y.; Jasmis J.; Amphawan A.
Published: (2018) -
802.11p optimization for delay sensitive in non-safety messages in VANETs
by: Elias S.J.; Warip M.N.M.; Elshaikh M.; Darus M.Y.; Ahmad R.B.
Published: (2018)