Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes

Data communication over the Internet has increased significantly, resulting in high data traffic and concerns over data security. Information sent over the Internet always gets the attention of intruders, which causes the effort to increase the security of sensitive data and the need to prevent leak...

Full description

Saved in:
Bibliographic Details
Main Authors: Osman, Baharudin, Yahya, Noor Izzah, Mohd Zaini, Khuzairi, Abdullah, Azizol
Format: Article
Language:English
Published: UUM Press 2023
Subjects:
Online Access:https://repo.uum.edu.my/id/eprint/29742/1/JCIA%2002%2001%202023%2021-40.pdf
https://doi.org/10.32890/jcia2023.2.1.2
https://repo.uum.edu.my/id/eprint/29742/
https://e-journal.uum.edu.my/index.php/jcia/article/view/16675
https://doi.org/10.32890/jcia2023.2.1.2
Tags: Add Tag
No Tags, Be the first to tag this record!