References
- Seonsu Ji, "Locating and Searching Hidden Messages in Stego-Images", KIISC, Vol. 14, No. 3, pp. 37-43, 2009.
- L. Y. POR and B. Delina, "Information Hiding: A New Approach in Text Steganography", Applied Computer&Applied Computational Science(ACACOS 2008) Hangzhou, China, pp. 689-695, 2008.
- Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal, "Study and Analysis of Text Steganography Tools", I. J. Computer Network and Information Security, Vol. 12, pp. 45-52, 2013.
- Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal, "A Procedure of Text Steganography Using Indian Regional Language", I. J. Computer Network and Information Security, pp. 65-73, 2012.
- Krista Bennett, "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text", CERIAS Tech Report 2004-13.
- Swati Gupta and Deepti Gupta, "Text-Steganography: Review Study & Comparative Analysis", International Journal of Computer Science and Information Technologies, Vol. 2 (5), pp. 2060-2062, 2011.
- S. R. Govada, B. S. Kumar, M. Devarakonda and M. J. Stephen, "Text Steganography with Multi level Shielding", IJCSI International Journal of Computer Science, Vol. 9, Issue 4, No 3, pp. 401-405, 2012.
- Neha Rani and Jyoti Chaudhary, "Text Steganography Techniques: A Review", International Journal of Engineering Trends and Technology, Vo. 4 Issue 7, pp. 3013-3015, 2013.
- Prem Singh, Rajat Chaudhary and Ambika Agarwal, "A Novel Approach of Text Steganography based on null spaces", IOSR Journal of Computer Engineering, Vol. 3, Issue 4, pp. 11-17, 2012. https://doi.org/10.9790/0661-0341117
- Anandaprova Majumder and Suvamoy Changder, "A Novel Approach for Text Steganography: Generating Text Summary using Reflection Symmetry", International Conference on Computational Intelligence: Modeling Techniques and Applications, Procedia Technology 10, pp. 112-120, 2013.
- Ammar Odeh and Khaled Elleithy, "Steganography in Arabic Text using Zero with and Ashidha Letters", International Journal of Computer Science & Information Technology, Vol 4, No 3, 2012.