Rahma et al., 2013 - Google Patents
Text steganography based on unicode of characters in multilingualRahma et al., 2013
View PDF- Document ID
- 17305039201530321845
- Author
- Rahma A
- Bhaya W
- Al-Nasrawi D
- Publication year
- Publication venue
- International Journal of Engineering Research and Applications
External Links
Snippet
Network security, and secure communications through public and private channels are more important issue specially when computer usage is increasing, for both social and business areas. Data hiding is one of approach to obtain a secure communication medium and …
- 238000000034 method 0 abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2217—Character encodings
- G06F17/2223—Handling non-latin characters, e.g. kana-to-kanji conversion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/28—Processing or translating of natural language
- G06F17/2863—Processing of non-latin text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/211—Formatting, i.e. changing of presentation of document
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/28—Processing or translating of natural language
- G06F17/289—Use of machine translation, e.g. multi-lingual retrieval, server side translation for client devices, real-time translation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/018—Input/output arrangements for oriental characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/023—Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00442—Document analysis and understanding; Document recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rahma et al. | Text steganography based on unicode of characters in multilingual | |
Taha et al. | A high capacity algorithm for information hiding in Arabic text | |
Al-Nofaie et al. | Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications | |
Mohamed | An improved algorithm for information hiding based on features of Arabic text: A Unicode approach | |
Singh et al. | A novel approach of text steganography based on null spaces | |
Shaker et al. | Text steganography using extensions Kashida based on the moon and sun letters concept | |
Baawi et al. | A comparative study on the advancement of text steganography techniques in digital media | |
Singh et al. | A survey on text based steganography | |
Shirali-Shahreza et al. | Arabic/Persian text steganography utilizing similar letters with different codes | |
Ali | New text steganography technique by using mixed-case font | |
Zhang et al. | Coverless text information hiding method based on the word rank map | |
Baawi et al. | New text steganography technique based on a set of two-letter words | |
Utama et al. | Performance review of feature-based method in implementation text steganography approach | |
Din et al. | Traid-bit embedding process on Arabic text steganography method | |
US9798721B2 (en) | Innovative method for text encodation in quick response code | |
Baawi et al. | Improvement of “text steganography based on unicode of characters in multilingual” by custom font with special properties | |
Muhammad et al. | Review on feature-based method performance in text steganography | |
Khairullah et al. | Steganography in bengali unicode text | |
Ali | A new text steganography method by using non-printing unicode characters | |
Din et al. | Evaluation review on effectiveness and security performances of text steganography technique | |
Changder et al. | A new approach to Hindi text steganography by shifting matra | |
Din et al. | The Design Review of Feature-based Method in Embedding the Hidden Message in Text as the Implementation of Steganography | |
Abbasi et al. | Urdu text steganography: Utilizing isolated letters | |
Shirali-Shahreza | A new Persian/Arabic text steganography using “La” word | |
Zaynalov et al. | UNICODE For Hiding Information In A Text Document |