A new data hiding technique based on irreducible polynomials
The mass diffusion of digital communication needs the special means of security. Cryptography concentrates on rendering the messages unreadable to any unauthorized person who might intercept those. In contrast, steganography is a method of concealing the existence of message to allow a secure commun...
| Main Authors: | Abduallah, Wafaa Mustafa, Rahma, Abdul Monem S., Pathan, Al-Sakib Khan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Academy Publisher, Finland
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/28217/ http://irep.iium.edu.my/28217/1/JETWI_template-72Revised.pdf |
Similar Items
Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
Data hiding within color images based on MCT with x-or operations
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Reversible data hiding scheme based on 3-Least significant bits and mix column transform
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014)
by: Ahmed, Zamzam Hohamed
Published: (2014)
A secured data hiding using affine transformation in video steganography
by: Ramalingam, Mritha, et al.
Published: (2020)
by: Ramalingam, Mritha, et al.
Published: (2020)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Digital watermarking and data hiding techniques
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
Security mechanisms and data access protocols in innovative wireless networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Technological impact on disaster management information system
by: Islam, Humayun Kadir, et al.
Published: (2004)
by: Islam, Humayun Kadir, et al.
Published: (2004)
Tackling Intruders in Wireless Mesh Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
A pay-and-stay model for tackling intruders in hybrid wireless mesh networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
On the key factors of usability in small-sized mobile touch-screen application
by: Gündüz, Feyza, et al.
Published: (2013)
by: Gündüz, Feyza, et al.
Published: (2013)
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013)
by: Mohammed, Mohssen, et al.
Published: (2013)
Usability improvements for touch-screen mobile flight booking application: a case study
by: Gündüz, Feyza, et al.
Published: (2012)
by: Gündüz, Feyza, et al.
Published: (2012)
Using text mining techniques for extracting information from research articles
by: Salloum, Said A., et al.
Published: (2017)
by: Salloum, Said A., et al.
Published: (2017)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
An efficient scheme for secure data transmission in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Video scene change detection based on histogram analysis for hiding message
by: M., Fuad, et al.
Published: (2021)
by: M., Fuad, et al.
Published: (2021)
Internet and distributed computing advancements : theoretical frameworks and practical applications
by: Abawajy, Jemal, et al.
Published: (2012)
by: Abawajy, Jemal, et al.
Published: (2012)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Learning Qur’anic Arabic through interactive Web-based software: a pragmatic approach in language for specific purpose
by: Abdullah, Matin Saad, et al.
Published: (2013)
by: Abdullah, Matin Saad, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Towards developing smart environment using wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Recurrent error-based ridge polynomial neural networks for time series forecasting
by: Hassan Saeed, Waddah Waheeb
Published: (2019)
by: Hassan Saeed, Waddah Waheeb
Published: (2019)
A new visual simulation tool for performance evaluation of MANET routing protocols
by: Sakib, Md. Sabbir Rahman, et al.
Published: (2010)
by: Sakib, Md. Sabbir Rahman, et al.
Published: (2010)
A Novel Reversible Data Hiding Technique with
High Capacity and Less Overhead Information
by: M. Almangush, Hamida, et al.
Published: (2012)
by: M. Almangush, Hamida, et al.
Published: (2012)
Finding a suitable hop-to-hop busty traffic transmission approach for underwater acoustic networks: handshake-based vs. handshake-free MAC protocols
by: Azad, Saiful, et al.
Published: (2018)
by: Azad, Saiful, et al.
Published: (2018)
Heterogeneous Distributed Sensor Networks (HDSN)
by: Pathan, Al-Sakib Khan
Published: (2007)
by: Pathan, Al-Sakib Khan
Published: (2007)
Security wireless sensor networks: prospects, challenges, and future
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Energy-efficient secure routing in heavily deployed wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Multi-dimensional networking and distributed computing services
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Similar Items
-
Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014) -
Data hiding within color images based on MCT with x-or operations
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013) -
Reversible data hiding scheme based on 3-Least significant bits and mix column transform
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013) -
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019) -
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)