Randomized pixel selection for enhancing LSB algorithm security against brute-force attack
| Format: | Restricted Document |
|---|
Similar Items
Brute force polarisation of xenon-129
by: O'Neill, Jason Darren
Published: (2008)
by: O'Neill, Jason Darren
Published: (2008)
An RFS ‘Brute force’ formulation for Bayesian SLAM
by: Mullane, J., et al.
Published: (2011)
by: Mullane, J., et al.
Published: (2011)
Automated negative lightning return strokes characterization
using brute-force search algorithm
by: Abdul Haris, Faranadia, et al.
Published: (2022)
by: Abdul Haris, Faranadia, et al.
Published: (2022)
Automated negative lightning return strokes characterization using brute-force search algorithm
by: Abdul Haris, Faranadia, et al.
Published: (2022)
by: Abdul Haris, Faranadia, et al.
Published: (2022)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
A new LSB attack on special-structured RSA primes
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2020)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2020)
Integrating fuzzy logic and brute force algorithm in optimizing energy management systems for battery electric vehicles
by: Abulifa, Abdulhadi Abdulsalam, et al.
Published: (2023)
by: Abulifa, Abdulhadi Abdulsalam, et al.
Published: (2023)
Integrating fuzzy logic and brute force algorithm in optimizing Energy Management Systems for Battery Electric Vehicles
by: Abdulsalam Abulifa, Abdulhadi, et al.
Published: (2024)
by: Abdulsalam Abulifa, Abdulhadi, et al.
Published: (2024)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Achieving security for images by LSB and MD5
by: Alahmad, Mohammad, et al.
Published: (2012)
by: Alahmad, Mohammad, et al.
Published: (2012)
A secure cryptographic algorithm against side channel attacks
by: Abu, Nur Azman, et al.
Published: (2015)
by: Abu, Nur Azman, et al.
Published: (2015)
Class Of Enhanced Capacity Secure Steganographic Systems Based On LSB Insertion Technique
by: Ling , Huo Chong
Published: (2002)
by: Ling , Huo Chong
Published: (2002)
Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm
by: Abdul Haris, Faranadia
Published: (2021)
by: Abdul Haris, Faranadia
Published: (2021)
Optimal loading analysis with penalty factors for generators using brute force method
by: Alam, Mohammad Khurshed, et al.
Published: (2022)
by: Alam, Mohammad Khurshed, et al.
Published: (2022)
A Class of Enhanced Capacity Secure Steganographic Systems Based On LSB Insertion Technique
by: Ling , Huo Chong
Published: (2002)
by: Ling , Huo Chong
Published: (2002)
Automatic question determination level based on OBE using brute force string matching
by: Loo Zhang, Bin
Published: (2013)
by: Loo Zhang, Bin
Published: (2013)
A balanced secure cryptographic algorithm against timing and side channel attacks
by: Abu, Nur Azman, et al.
Published: (2014)
by: Abu, Nur Azman, et al.
Published: (2014)
Low-field thermal mixing in [1-13C] pyruvic acid for brute-force hyperpolarization
by: Peat, David T., et al.
Published: (2016)
by: Peat, David T., et al.
Published: (2016)
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
by: Nur Alya Afikah, Usop
Published: (2024)
by: Nur Alya Afikah, Usop
Published: (2024)
Least Significant Bit (LSB) and Random Right
Circular Shift (RRCF) in digital watermarking
by: Kurdi, Moustafa M., et al.
Published: (2016)
by: Kurdi, Moustafa M., et al.
Published: (2016)
Security against DoS attack in mobile IP communication
by: Parvin, S., et al.
Published: (2009)
by: Parvin, S., et al.
Published: (2009)
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
On the Security of NOEKEON against Side Channel Cube Attacks
by: Abdul-Latip, S. F., et al.
Published: (2010)
by: Abdul-Latip, S. F., et al.
Published: (2010)
LSB algorithm based on support vector machine in digital image steganography
by: Hussain, Hanizan Shaker, et al.
Published: (2017)
by: Hussain, Hanizan Shaker, et al.
Published: (2017)
PSW statistical LSB image steganalysis
by: Shojae Chaeikar, Saman, et al.
Published: (2017)
by: Shojae Chaeikar, Saman, et al.
Published: (2017)
Prototype development for embedding large amount of information using secure LSB and neural based steganography
by: Saleh, Basam N.
Published: (2009)
by: Saleh, Basam N.
Published: (2009)
Nonlinear Local-pixel-shifting Color Constancy Algorithm
by: Wan Muhammad Syahrir, Wan Hussin, et al.
Published: (2018)
by: Wan Muhammad Syahrir, Wan Hussin, et al.
Published: (2018)
Enhanced LSB watermarking methods based on scanning patterns for authentication of medical images
by: Syifak Izhar, Hisham
Published: (2016)
by: Syifak Izhar, Hisham
Published: (2016)
A brute-strength approach to improving the quality of seismoelectric data
by: Dean, T, et al.
Published: (2012)
by: Dean, T, et al.
Published: (2012)
Creative Pixels
by: Ahmad Rafi, M.E, et al.
Published: (2005)
by: Ahmad Rafi, M.E, et al.
Published: (2005)
Protection mechanisms using LSB and MD5
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit
by: Abdullah Bamatraf, Abdullah Omar
Published: (2012)
by: Abdullah Bamatraf, Abdullah Omar
Published: (2012)
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014)
by: Ahmed, Zamzam Hohamed
Published: (2014)
Corner pixel-based method for selecting binary text in scene
by: Ednawati Rainarli,, et al.
Published: (2024)
by: Ednawati Rainarli,, et al.
Published: (2024)
Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
Integrating Pixel-Based Algorithms for Area Measurement in Brain Tumor Classification
by: Dwi Swasono, Rachmad
Published: (2025)
by: Dwi Swasono, Rachmad
Published: (2025)
A new digital watermarking algorithm using combination of Least Significant Bit (LSB) and inverse bit
by: Bamatraf, Abdullah, et al.
Published: (2011)
by: Bamatraf, Abdullah, et al.
Published: (2011)
An Enhanced Model for Increasing Awareness of Vocational Students Against Phishing Attacks
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Similar Items
-
Brute force polarisation of xenon-129
by: O'Neill, Jason Darren
Published: (2008) -
An RFS ‘Brute force’ formulation for Bayesian SLAM
by: Mullane, J., et al.
Published: (2011) -
Automated negative lightning return strokes characterization
using brute-force search algorithm
by: Abdul Haris, Faranadia, et al.
Published: (2022) -
Automated negative lightning return strokes characterization using brute-force search algorithm
by: Abdul Haris, Faranadia, et al.
Published: (2022) -
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)