e-Forensics steganography systems for secret information retrieval
Steganography is the art and science of hiding information. This paper introduces e-Forensics as a novel technique for extracting secret information electronically creatively. We propose an e-Forensics system capable of detecting or extracting secret information using generic steganalytic algorithms...
| Main Authors: | Potdar, Vidyasagar, Khan, Muhammed, Chang, Elizabeth, Ulieru, M., Worthington, P. |
|---|---|
| Format: | Journal Article |
| Published: |
Elsevier Ltd
2005
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/43915 |
Similar Items
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Semi-Automatic Information Extraction from Discussion Boards with Applications for Anti-Spam Technology
by: Sarencheh, S., et al.
Published: (2010)
by: Sarencheh, S., et al.
Published: (2010)
Mathematical Aspects of Word Embeddings
by: Carrington, Rachel
Published: (2021)
by: Carrington, Rachel
Published: (2021)
Indexing strategies of MapReduce for information retrieval in big data
by: Ramadhan, Mazen Farid Ebrahim
Published: (2016)
by: Ramadhan, Mazen Farid Ebrahim
Published: (2016)
The effects of cannabinoids on insulin secretion
by: Anderson, Richard L.
Published: (2011)
by: Anderson, Richard L.
Published: (2011)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)
by: Roslan, Nuur Alifah
Published: (2011)
Model guided algorithm for mining unordered embedded subtrees
by: Hadzic, Fedja, et al.
Published: (2010)
by: Hadzic, Fedja, et al.
Published: (2010)
Modeling lexical semantics of terms based on synword identification for idea mining in information retrieval
by: Alksher, Mostafa Ahmed
Published: (2018)
by: Alksher, Mostafa Ahmed
Published: (2018)
Flexible autonomy and context in human-agent collectives
by: Dybalova, Daniela
Published: (2017)
by: Dybalova, Daniela
Published: (2017)
What you need to know before implementing a clinical research data warehouse: Comparative review of integrated data repositories in health care institutions
by: Gagalova, Kristina, et al.
Published: (2020)
by: Gagalova, Kristina, et al.
Published: (2020)
Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno
by: Karno, Md Razib
Published: (2015)
by: Karno, Md Razib
Published: (2015)
Generating of cotidal dataset by spatial interpolation techniques / Khadijah Sahdan, Syed Ahmad Qusoiri Syed Abdul Karim and Othman Mohd Yusof
by: Khadijah, Sahdan, et al.
Published: (2015)
by: Khadijah, Sahdan, et al.
Published: (2015)
Propositional satisfiability method in rough classification modeling for data mining
by: Abu Bakar, Azuraliza
Published: (2002)
by: Abu Bakar, Azuraliza
Published: (2002)
Towards the development of a strategy for a national spatial data infrastructure
by: Al-Shahrani, Abdullah M.R.
Published: (2002)
by: Al-Shahrani, Abdullah M.R.
Published: (2002)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
Avoiding the internet of insecure industrial things
by: Urquhart, Lachlan, et al.
Published: (2018)
by: Urquhart, Lachlan, et al.
Published: (2018)
Farm families and its challenges of using ICT in retrieving information on agriculture in Malaysia
by: Omar, Siti Zobidah, et al.
Published: (2010)
by: Omar, Siti Zobidah, et al.
Published: (2010)
(Dys)Regulation of Insulin Secretion by Macronutrients
by: Newsholme, Philip, et al.
Published: (2015)
by: Newsholme, Philip, et al.
Published: (2015)
Online personal computer component customization / Mohamad Aminuddin Mohd Bayaki
by: Mohd Bayaki, Mohamad Aminuddin
Published: (2014)
by: Mohd Bayaki, Mohamad Aminuddin
Published: (2014)
The practical politics of sharing personal data
by: Tolmie, Peter, et al.
Published: (2017)
by: Tolmie, Peter, et al.
Published: (2017)
Efficient and secured compression and steganography technique in wireless sensor network
by: Tuama, Ammar Yaseen
Published: (2016)
by: Tuama, Ammar Yaseen
Published: (2016)
Data Mining: Techniques and Applications in the Manufacturing Industry
by: Al-Nimer, Thaer
Published: (2006)
by: Al-Nimer, Thaer
Published: (2006)
Investigating the mechanisms of secretion of the moonlighting proteins Enolase and Fructose-1, 6-Bisphosphate Aldolase in Neisseria meningitidis
by: Atwah, Banan
Published: (2019)
by: Atwah, Banan
Published: (2019)
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
GIS - based land suitability analysis using AHP for public parks planning in Kota Bharu, Kelantan / Khalilah Hassan, Izrahayu Che Hashim and Siti Syamimi Omar
by: Khalilah, Hassan, et al.
Published: (2015)
by: Khalilah, Hassan, et al.
Published: (2015)
Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data
by: Mohd Rahim, Mohd Shafry
Published: (2008)
by: Mohd Rahim, Mohd Shafry
Published: (2008)
Effects of Motion Sickness on Encoding and Retrieval Performance and on Psychophysiological Responses
by: Sjörs, A., et al.
Published: (2014)
by: Sjörs, A., et al.
Published: (2014)
Ontology driven geographic information retrieval
by: Addy, Nicholas G
Published: (2009)
by: Addy, Nicholas G
Published: (2009)
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
by: Muhammad @ Atan, Nurmalessa
Published: (2020)
by: Muhammad @ Atan, Nurmalessa
Published: (2020)
A survey of business process complexity metrics.
by: Muketha, G.M., et al.
Published: (2010)
by: Muketha, G.M., et al.
Published: (2010)
Increasing value and reducing waste in data extraction for systematic reviews: tracking data in data extraction forms
by: Shokraneh, Farhad, et al.
Published: (2017)
by: Shokraneh, Farhad, et al.
Published: (2017)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
Phytochemical screening and bioactivity study of Murraya Koenigii leaves / Nur Atikah Salleh
by: Salleh, Nur Atikah
Published: (2017)
by: Salleh, Nur Atikah
Published: (2017)
Web semantics for intelligent and dynamic information retrieval illustrated within the mental health domain
by: Hadzic, Maja, et al.
Published: (2008)
by: Hadzic, Maja, et al.
Published: (2008)
Three fold system (3FS) for mental health domain
by: Hadzic, Maja, et al.
Published: (2007)
by: Hadzic, Maja, et al.
Published: (2007)
The type III secretion system and its role in the multicellular behaviour of Yersinia species
by: Barratt, Natalie Alice
Published: (2018)
by: Barratt, Natalie Alice
Published: (2018)
Similar Items
-
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005) -
Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
by: Potdar, Vidyasagar, et al.
Published: (2005) -
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005) -
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006) -
Semi-Automatic Information Extraction from Discussion Boards with Applications for Anti-Spam Technology
by: Sarencheh, S., et al.
Published: (2010)