[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Rahma et al., 2013 - Google Patents

Text steganography based on unicode of characters in multilingual

Rahma et al., 2013

View PDF
Document ID
17305039201530321845
Author
Rahma A
Bhaya W
Al-Nasrawi D
Publication year
Publication venue
International Journal of Engineering Research and Applications

External Links

Snippet

Network security, and secure communications through public and private channels are more important issue specially when computer usage is increasing, for both social and business areas. Data hiding is one of approach to obtain a secure communication medium and …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • G06F17/2217Character encodings
    • G06F17/2223Handling non-latin characters, e.g. kana-to-kanji conversion
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/28Processing or translating of natural language
    • G06F17/2863Processing of non-latin text
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/211Formatting, i.e. changing of presentation of document
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/28Processing or translating of natural language
    • G06F17/289Use of machine translation, e.g. multi-lingual retrieval, server side translation for client devices, real-time translation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/27Automatic analysis, e.g. parsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/018Input/output arrangements for oriental characters
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00442Document analysis and understanding; Document recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition

Similar Documents

Publication Publication Date Title
Rahma et al. Text steganography based on unicode of characters in multilingual
Taha et al. A high capacity algorithm for information hiding in Arabic text
Al-Nofaie et al. Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications
Mohamed An improved algorithm for information hiding based on features of Arabic text: A Unicode approach
Singh et al. A novel approach of text steganography based on null spaces
Shaker et al. Text steganography using extensions Kashida based on the moon and sun letters concept
Baawi et al. A comparative study on the advancement of text steganography techniques in digital media
Singh et al. A survey on text based steganography
Shirali-Shahreza et al. Arabic/Persian text steganography utilizing similar letters with different codes
Ali New text steganography technique by using mixed-case font
Zhang et al. Coverless text information hiding method based on the word rank map
Baawi et al. New text steganography technique based on a set of two-letter words
Utama et al. Performance review of feature-based method in implementation text steganography approach
Din et al. Traid-bit embedding process on Arabic text steganography method
US9798721B2 (en) Innovative method for text encodation in quick response code
Baawi et al. Improvement of “text steganography based on unicode of characters in multilingual” by custom font with special properties
Muhammad et al. Review on feature-based method performance in text steganography
Khairullah et al. Steganography in bengali unicode text
Ali A new text steganography method by using non-printing unicode characters
Din et al. Evaluation review on effectiveness and security performances of text steganography technique
Changder et al. A new approach to Hindi text steganography by shifting matra
Din et al. The Design Review of Feature-based Method in Embedding the Hidden Message in Text as the Implementation of Steganography
Abbasi et al. Urdu text steganography: Utilizing isolated letters
Shirali-Shahreza A new Persian/Arabic text steganography using “La” word
Zaynalov et al. UNICODE For Hiding Information In A Text Document