2021
DOI: 10.1007/s41870-020-00572-z
|View full text |Cite
|
Sign up to set email alerts
|

Text steganography in webometrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Recently, blockchain technology was used in the healthcare system to increase security. For example Z Wang et al [7] suggested a concept of Gaurdhealth in which a decentralised blockchain system is used for sharing data and protecting privacy in the medical sector.…”
Section: Blockchain Technologymentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, blockchain technology was used in the healthcare system to increase security. For example Z Wang et al [7] suggested a concept of Gaurdhealth in which a decentralised blockchain system is used for sharing data and protecting privacy in the medical sector.…”
Section: Blockchain Technologymentioning
confidence: 99%
“…Additionally, the records of medical data exchange are not adequately preserved, making it difficult to trace and track such communication. The RDH method can be utilised in many different applications, including webometrics [6], digital forensic [7], e-health record transfer [8], and transfer of digital money [9].…”
Section: Introductionmentioning
confidence: 99%
“…In order to safeguard secret messages in twoway communication, the concept of application steganography has been employed since the beginning of time [13][14][15]. The primary goal of steganography application is to mask sensitive information in various data transfer modes [16].…”
Section: Introductionmentioning
confidence: 99%
“…This study focuses on the feature-based approach development for text steganography [27]. By embedding the message based on the distinctive qualities of letters and any languages that employ A-Z letters in a message, the hidden messages might be hidden using this technique [16,28].…”
Section: Introductionmentioning
confidence: 99%