[1] A. F. Al-Azzawi1, A multi-layer hybrid text steganography for secret communication using word tagging and rgb color coding, Int. J. Netw. Secur. Appl., 10 (2018), pp. 1–12.
[2] S. Al-Nofaie, M. Fattani, and A. Gutub, Merging two steganography techniques adjusted to improve Arabic text data security, J. Comput. Sci. Comput. Math. (JCSCM), 6 (2016), pp. 59–65.
[3] S. Al-Nofaie, A. Gutub, and M. Al-Ghamdi, Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces, J. King Saud Univ. Comput. Inf. Sci., 33 (2021), pp. 963–974.
[4] N. Alanazi, E. Khan, and A. Gutub, Inclusion of unicode standard seamless characters to expand arabic text steganography for secure individual uses, J. King Saud Univ. Comput. Inf. Sci., 34 (2022), pp. 1343–1356.
[5] R. A. Alotaibi and L. A. Elrefaei, Utilizing word space with pointed and un-pointed letters for Arabic text watermarking, in 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim), 2016, pp. 111–116.
[6] R. A. Alotaibi and L. A. Elrefaei, Improved capacity arabic text watermarking methods based on open word space, J. King Saud Univ. Comput. Inf. Sci., 30 (2018), pp. 236–248.
[7] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding, IBM Systems Journal, 35 (1996), pp. 313–336.
[8] S. G. R. Ekodeck and R. Ndoundam, PDF steganography based on Chinese Remainder Theorem, J. Inf. Secur. Appl., 29 (2016), pp. 1–15.
[9] A. Gutub and A. Al-Nazer, High capacity steganography tool for Arabic text using ’kashida’, ISC Int. J. Inf. Secur, 2 (2010), pp. 107–118.
[10] N. Ibraheem, M. Hasan, R. Z. Khan, and P. Mishra, Understanding color models: A review, 2 (2012), pp. 265–275.
[11] J. Karnel Sadie, L. Moyou Metcheka, and R. Ndoundam, Two high capacity text steganography schemes based on color coding, Revue Africaine de Recherche en Informatique et Math´ematiques Appliqu´ees, (2024).
[12] M. Khairullah, A novel text steganography system using font color of the invisible characters in Microsoft Word Documents, in 2009 Second International Conference on Computer and Electrical Engineering, vol. 1, 2009, pp. 482–484.
[13] A. Khan, Robust textual steganography, Journal of Science, 4 (2015), pp. 426–434.
[14] B. Khosravi and B. Khosravi, Text steganography based on text justifying methods, Adv. Defence Sci. & Technol., 12 (2021), pp. 159–167.
[15] B. Khosravi, B. Khosravi, B. Khosravi, and K. Nazarkardeh, A new method for pdf steganography in justified texts, Journal of Information Security and Applications, 45 (2019), pp. 61–70.
[16] R. Kumar, A. Malik, S. Singh, and S. Chand, A high capacity email based text steganography scheme using huffman compression, in 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 2016, pp. 53–56.
[17] I.-S. Lee and W.-H. Tsai, A new approach to covert communication via PDF files, Signal Processing, 90 (2010), pp. 557–565.
[18] L. Li, W. Zhang, K. Chen, and N. Yu, Steganographic security analysis from side channel steganalysis and its complementary attacks, IEEE Transactions on Multimedia, 22 (2020), pp. 2526–2536.
[19] L. Li, W. Zhang, K. Chen, H. Zha, and N. Yu, Side channel steganalysis: When behavior is considered in steganographer detection, Multimed. Tools Appl., 78 (2019), pp. 8041—-8055.
[20] T.-Y. Liu and W.-H. Tsai, A new steganographic method for data hiding in microsoft word documents by a change tracking technique, IEEE Transactions on Information Forensics and Security, 2 (2007), pp. 24–30.
[21] S. Mahato, D. A. Khan, and D. K. Yadav, A modified approach to data hiding in Microsoft Word documents by change-tracking technique, J. King Saud Univ. Comput. Inf. Sci., 32 (2020), pp. 216–224.
[22] G. Maji and S. Mandal, A forward email based high capacity text steganography technique using a randomized and indexed word dictionary, Multimed. Tools Appl., 79 (2020), pp. 26549–26569.
[23] A. Malik, G. Sikka, and H. K. Verma, A high capacity text steganography scheme based on lzw compression and color coding, Eng. Sci. Technol. Int J., 20 (2017), pp. 72–79.
[24] A. A. Obeidat, Arabic text steganography using unicode of non-joined to right side letters, Journal of Computer Science, 13 (2017), pp. 184–191.
[25] Online Applet, HSL to RGB/RGB to HSL/Hex Colour Converter. https://www.peko-step.com/en/tool/ hslrgb_en.html. Accessed: 2023.
[26] B. Osman, Message hiding technique in text steganography using RGB colour approach and random location, PhD thesis, Universiti Utara Malaysia, Changlun, Malaysia, 2020.
[27] L. Y. Por, K. Wong, and K. O. Chee, Unispach: A text-based data hiding method using unicode space characters, J. Syst. Softw., 85 (2012), pp. 1075–1082.
[28] N. Provos and P. Honeyman, Hide and seek: an introduction to steganography, IEEE Security & Privacy, 1 (2003), pp. 32–44.
[29] S. G. Rizzo, F. Bertini, and D. Montesi, Fine-grain watermarking for intellectual property protection, EURASIP J. Inf. Secur., 2019 (2019).
[30] M. Shirali-Shahreza and M. Shirali-Shahreza, A new approach to Persian/Arabic text steganography, in 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICISCOMSAR’06), 2006, pp. 310–315.
[31] M. Shirali-Shahreza and M. H. Shirali-Shahreza, Text steganography in SMS, in 2007 International Conference on Convergence Information Technology (ICCIT 2007), 2007, pp. 2260–2265.
[32] M. H. Shirali-Shahreza and M. Shirali-Shahreza, A new synonym text steganography, in 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008, pp. 1524–1526.
[33] M. Taleby Ahvanooey, Q. Li, J. Hou, H. Dana Mazraeh, and J. Zhang, AITSteg: An innovative text steganography technique for hidden transmission of text message via social media, IEEE Access, 2018 (2018), pp. 65981–65995.
[34] M. Taleby Ahvanooey, Q. Li, H. J. Shim, and Y. Huang, A comparative analysis of information hiding techniques for copyright protection of text documents, Secur. Commun. Networks, 2018 (2018).
[35] M. Taleby Ahvanooey, M. X. Zhu, W. Mazurczyk, Q. Li, M. Kilger, K.-K. R. Choo, and M. Conti, CovertSYS: A systematic covert communication approach for providing secure end-to-end con[1]versation via social networks, J. Inf. Secur. Appl., 71 (2022), 103368.
[36] R. Thabit, N. I. Udzir, S. M. Yasin, A. Asmawi, and A. A.-A. Gutub, CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data, IEEE Access, 10 (2022), pp. 65439–65458.
[37] D.-C. Wu and Y.-T. Hsu, Authentication of LINE chat history files by information hiding, ACM Trans. Multimedia Comput. Commun. Appl., 18 (2022), pp. 1–23.
[38] L. Xiang, W. Wu, X. Li, and C. Yang, A linguistic steganography based on word indexing compression and candidate selection, Multimed. Tools Appl., 77 (2018), pp. 28969–28989.
[39] C. Xiao, C. Zhang, and C. Zheng, Fontcode: Embedding information in text documents using glyph perturbation, ACM Trans. Graph., 37 (2018), pp. 1–16.
[40] W.-C. Yang and L.-H. Chen, A steganographic method via various animations in PowerPoint files, Multimed. Tools Appl., 74 (2015), pp. 1003–1019.
[41] M. Zamani, A. B. A. Manaf, R. B. Ahmad, F. Jaryani, H. Taherdoost, and A. M. Zeki, A secure audio steganography approach, in 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), London, U.K., 2009, pp. 1–6.
[42] S. Zhong, X. Cheng, and T. Chen, Data hiding in a kind of PDF texts for secret communication, Int. J. Netw. Secur., 4 (2007), pp. 17–26.