“Stego-analysis chain, session two” novel approach of stego-analysis system for image file
Stenography systems has too many approaches, it has a lot of applications and different ways, too many type of attackers have been tried to attacked the information that already embed in the carrier, however there is not yet a real stego- analysis system offered, the goal of this chain is to have t...
| Main Authors: | Naji, Ahmed Wathik, Hameed, Shihab A., Islam, Md. Rafiqul, Zaidan, B .B., Gunawan, Teddy Surya, Zaidan, A.A. |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/2334/ http://irep.iium.edu.my/2334/1/Stego-Analysis_Chain%2C_Session_Two%2C_Novel_Approach_of_Stego-Analysis_System_for_Image_File.pdf |
Similar Items
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Novel framework for hidden data in the image page within
executable file using computation between advanced encryption standard and distortion techniques
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Novel simulation framework of three-dimensional skull bio-metric measurement
by: Hameed, Shihab A., et al.
Published: (2009)
by: Hameed, Shihab A., et al.
Published: (2009)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
Security improvement of credit card online purchasing system
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
An accurate method to obtain bio-metric measurements for three dimensional skull
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018)
by: Taufik, Ichsan, et al.
Published: (2018)
A novel theoretical analysis of quadruple pass Erbium doped
fiber amplifier
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
Optimizing security and flexibility by designing a high security system for e-government servers
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
Novel MEMS fully differential capacitive transducer design and analysis
by: Ya, Ma Li, et al.
Published: (2011)
by: Ya, Ma Li, et al.
Published: (2011)
Analysis of adaptive video streaming for users with demand heterogeneity
by: Issa, Sinzobakwira, et al.
Published: (2018)
by: Issa, Sinzobakwira, et al.
Published: (2018)
Design and implementation of novel parallel speech processing algorithms on a multicore system
by: Gunawan, Teddy Surya
Published: (2012)
by: Gunawan, Teddy Surya
Published: (2012)
On the optimal window shape for genomic signal processing
by: Gunawan, Teddy Surya
Published: (2008)
by: Gunawan, Teddy Surya
Published: (2008)
Preliminary analysis on the effect of rain attenuation on Free Space Optics (FSO) propagation measured in tropical weather condition
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
Kinematic analysis of rotary car parking system mechanism
by: Nursalim, Iim, et al.
Published: (2018)
by: Nursalim, Iim, et al.
Published: (2018)
Qualitative analysis on watermarking algorithm for large resolution camera phone image
by: Saquib, Nazmus, et al.
Published: (2014)
by: Saquib, Nazmus, et al.
Published: (2014)
A real-time mobile notification system for inventory stock out detection using SIFT and RANSAC
by: Merrad, Yacine, et al.
Published: (2020)
by: Merrad, Yacine, et al.
Published: (2020)
An overview of laser principle, laser–tissue interaction mechanisms and laser safety precautions for medical laser users
by: M. Jawad, Mohammed, et al.
Published: (2011)
by: M. Jawad, Mohammed, et al.
Published: (2011)
An overview: laser applications in dentistry
by: M. Jawad, Mohammed, et al.
Published: (2011)
by: M. Jawad, Mohammed, et al.
Published: (2011)
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
by: A. M., Aleesa, et al.
Published: (2020)
by: A. M., Aleesa, et al.
Published: (2020)
Review of intrusion detection systems based on deep learning
techniques: coherent taxonomy, challenges, motivations,
recommendations, substantial analysis and future directions
by: Aleesa, A. M., et al.
Published: (2004)
by: Aleesa, A. M., et al.
Published: (2004)
Comparative analysis of digital artifact persistence between file format
by: Saari, Anati Dalila, et al.
Published: (2017)
by: Saari, Anati Dalila, et al.
Published: (2017)
Stego keys performance on feature based coding method in text domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
PC sound card based instrumentation and control
by: Gunawan, Teddy Surya
Published: (2011)
by: Gunawan, Teddy Surya
Published: (2011)
Protein coding identification using modified gabor wavelet transform on multicore system
by: Gunawan, Teddy Surya
Published: (2011)
by: Gunawan, Teddy Surya
Published: (2011)
Complexity algorithm analysis for edit distance
by: Maarif, Haris Al Qodri, et al.
Published: (2014)
by: Maarif, Haris Al Qodri, et al.
Published: (2014)
A review on emotion recognition algorithms using speech analysis
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Digital photography based food intake prediction using artificial neural network
by: Gunawan, Teddy Surya, et al.
Published: (2017)
by: Gunawan, Teddy Surya, et al.
Published: (2017)
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
by: Gunawan, Teddy Surya, et al.
Published: (2013)
by: Gunawan, Teddy Surya, et al.
Published: (2013)
Audio files comparison with wavelet transform
by: Jiang, Chengjun
Published: (2023)
by: Jiang, Chengjun
Published: (2023)
Secure topology for electronic medical record transmission
by: Alanazi, Hamdan O., et al.
Published: (2010)
by: Alanazi, Hamdan O., et al.
Published: (2010)
Performance analysis of IEEE 1857.2 lossless audio compression linear predictor algorithm
by: Abdul Muin, Fathiah, et al.
Published: (2017)
by: Abdul Muin, Fathiah, et al.
Published: (2017)
Image analysis model for skin disease detection: framework
by: Haddad, Alaa, et al.
Published: (2018)
by: Haddad, Alaa, et al.
Published: (2018)
Integrated emergency and guidance system based on WiMAX wireless technology (IEGSW)
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Performance evaluation of multichannel audio compression
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Similar Items
-
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017) -
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)