Steganography technique using modulus arithmetic
This new technique will use modulus arithmetic to incorporate secret-information into a host-image. Modulus arithmetic is used as the mechanism for embedding and extracting process. Modulus-m operation indicates l-bits of the secret-information can be incorporated into the host-image pixel. This ap...
| Main Authors: | Jaafar, Sayuthi, Manaf, Azizah A., Zeki, Akram M. |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/30815/ http://irep.iium.edu.my/30815/1/04555443.pdf |
Similar Items
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Robust Audio Steganography via Genetic Algorithm
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
An artificial-intelligence-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Variable size of blocks for embedding watermark images using ISB technique
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Exploring the challenges of MP3 audio steganography
by: Atoum, Mohammed Salem, et al.
Published: (2014)
by: Atoum, Mohammed Salem, et al.
Published: (2014)
Structurally and arithmetically controlled grammars
by: Ashaari, S, et al.
Published: (2016)
by: Ashaari, S, et al.
Published: (2016)
A novel text steganography technique to Arabic language using reverse fatah
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Secret channel using video steganography
by: Lee, Kar Yee, et al.
Published: (2017)
by: Lee, Kar Yee, et al.
Published: (2017)
Evaluation of modulus of elasticity and modulus of subgrade reaction of soils using CBR test
by: Putri, E.E, et al.
Published: (2012)
by: Putri, E.E, et al.
Published: (2012)
Watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2010)
by: Zeki, Akram M., et al.
Published: (2010)
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010)
by: Zamani, Mazdak
Published: (2010)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Arithmetic and relational operators
by: Bhatti, Zeeshan, et al.
Published: (2011)
by: Bhatti, Zeeshan, et al.
Published: (2011)
Digital watermarking and data hiding techniques
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2009)
by: Zeki, Akram M., et al.
Published: (2009)
An improved image steganography algorithm based on PVD
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
Image steganography
by: Jeniffer, Chegaram
Published: (2012)
by: Jeniffer, Chegaram
Published: (2012)
Information hiding using steganography
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Large Integer Arithmetic in GPU for Cryptography
by: Lee, Wen Dick
Published: (2017)
by: Lee, Wen Dick
Published: (2017)
Arithmetic version of boolean algebra
by: Azram, Mohammad, et al.
Published: (2009)
by: Azram, Mohammad, et al.
Published: (2009)
Arithmetic version of boolean algebra
by: Azram, Mohammad, et al.
Published: (2010)
by: Azram, Mohammad, et al.
Published: (2010)
Arithmetic version of boolean algebra
by: Azram, Mohammad, et al.
Published: (2009)
by: Azram, Mohammad, et al.
Published: (2009)
Steganography algorithm to hide secret message inside an image
by: Ibrahim, Rosziati, et al.
Published: (2011)
by: Ibrahim, Rosziati, et al.
Published: (2011)
A Robust Cover Generation Technique for Steganography Using 2D Images
by: Ahmad Zawawi, Md. Nabil
Published: (2006)
by: Ahmad Zawawi, Md. Nabil
Published: (2006)
High watermarking capacity based on spatial domain technique
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Efficient and secured compression and steganography technique in wireless sensor network
by: Tuama, Ammar Yaseen
Published: (2016)
by: Tuama, Ammar Yaseen
Published: (2016)
The evaluation performance of letter-based techniques on text steganography method
by: Ismail, Azizan, et al.
Published: (2018)
by: Ismail, Azizan, et al.
Published: (2018)
Recognition techniques for online Arabic handwriting recognition systems
by: Abuzaraida, Mustafa Ali, et al.
Published: (2012)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2012)
Enhanced Steganography Framework Based On Lossless Compression And Histogram
by: Kasasbeh, Dima Suliman Mohammad
Published: (2024)
by: Kasasbeh, Dima Suliman Mohammad
Published: (2024)
Interaction of topology and algebra in arithmetic geometry
by: Camara, Alberto
Published: (2013)
by: Camara, Alberto
Published: (2013)
Investigations in two-dimensional arithmetic geometry
by: Morrow, Matthew Thomas
Published: (2009)
by: Morrow, Matthew Thomas
Published: (2009)
Al-Kashi and access to the arithmetic & astronomy
by: Rasheed, Aous Naji, et al.
Published: (2011)
by: Rasheed, Aous Naji, et al.
Published: (2011)
Arithmetic expressions and data types in C++
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Feature extraction techniques of online handwriting arabic text recognition
by: Abuzaraida, Mustafa Ali, et al.
Published: (2013)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2013)
Arithmetic deformation theory via arithmetic fundamental groups and nonarchimedean theta functions, notes on the work of Shinichi Mochizuki
by: Fesenko, Ivan
Published: (2015)
by: Fesenko, Ivan
Published: (2015)
Similar Items
-
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009) -
Robust Audio Steganography via Genetic Algorithm
by: Zamani, Mazdak, et al.
Published: (2009) -
An artificial-intelligence-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009) -
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009) -
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)