共 45 条
[1]
Adnan G., 2010, Bahria University Journal of Information Communication Technology, V3, P68
[2]
Ahmadoh Esraa Mohammad, 2015, Lecture Notes on Information Theory, V3, P42, DOI 10.18178/lnit.3.1.42-47
[3]
Ahmed H. M., 2016, MUSTANSIRIYAH J SCI, V17, P397
[4]
Al Azzawi A. F., 2019, INT J NETW SECUR APP, V11, P27, DOI [10.5121/ijnsa.2019.11103.855, DOI 10.5121/IJNSA.2019.11103.855]
[5]
Al-Azawi A. F., 2010, Journal of Applied Sciences, V10, P436, DOI 10.3923/jas.2010.436.439
[6]
Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions
[J].
2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2,
2009,
:396-399
[10]
Utilizing Word Space with Pointed and Un-pointed Letters for Arabic Text Watermarking
[J].
2016 UKSIM-AMSS 18TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM),
2016,
:111-116