Novel framework for hidden data in the image page within executable file using computation between advanced encryption standard and distortion techniques
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necess...
| Main Authors: | Naji, Ahmed Wathik, Hameed, Shihab A., Al-Khateeb, Wajdi Fawzi Mohammed, O-Khalifa, Othman, Zaidan , A. A., Gunawan, Teddy Surya |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
LJS Publisher and IJCSIS Press
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/417/ http://irep.iium.edu.my/417/1/Novel_framework_for_hidden_data_in_the_image_page_within.pdf |
Similar Items
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
“Stego-analysis chain, session two” novel approach of stego-analysis system for image file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
File encryption by iris recognition system
by: Musab A. M. Ali,, et al.
Published: (2024)
by: Musab A. M. Ali,, et al.
Published: (2024)
English digits speech recognition system based on hidden Markov Models
by: Gunawan, Teddy Surya, et al.
Published: (2011)
by: Gunawan, Teddy Surya, et al.
Published: (2011)
The Hidden Costs of Trade Execution
by: Rath, Subhrendu
Published: (2004)
by: Rath, Subhrendu
Published: (2004)
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024)
by: Siti Munirah, Mohd, et al.
Published: (2024)
The performance of the 3DES and Fernet encryption in securing data files
by: Mohd, Siti Munirah, et al.
Published: (2024)
by: Mohd, Siti Munirah, et al.
Published: (2024)
On the use of edge features and exponential decaying number of nodes in the hidden layers for handwritten signature recognition
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
English digits speech recognition system based on Hidden Markov Models
by: Abushariah, Ahmad A. M., et al.
Published: (2010)
by: Abushariah, Ahmad A. M., et al.
Published: (2010)
Enhancing selective encryption for H.264/AVC using advanced encryption standard
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Challenges in data representation for efficient execution of encryption operation
by: Afendee Mohamed, Mohamad, et al.
Published: (2024)
by: Afendee Mohamed, Mohamad, et al.
Published: (2024)
Unicode encryption and its role in facilitating writing Quran using the computer
by: Abudena, Mussa A., et al.
Published: (2016)
by: Abudena, Mussa A., et al.
Published: (2016)
Enhancing the searchability of page-image PDF documents using an aligned hidden layer from a truth text
by: Knight, Ian A., et al.
Published: (2016)
by: Knight, Ian A., et al.
Published: (2016)
A model for ensuring data confidentiality: In healthcare and medical emergency
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Confidentiality to service medical emergency model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Privacy in medical emergency system: cryptographic and security aspects
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Toward confidential distributed medical emergency system and security service
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018)
by: Taufik, Ichsan, et al.
Published: (2018)
Implementation of Internet based remote control and monitoring
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2009)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2009)
Novel simulation framework of three-dimensional skull bio-metric measurement
by: Hameed, Shihab A., et al.
Published: (2009)
by: Hameed, Shihab A., et al.
Published: (2009)
A novel theoretical analysis of quadruple pass Erbium doped
fiber amplifier
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
Word classification for sign language synthesizer using hidden Markov model
by: Maarif, Haris Al Qodri, et al.
Published: (2014)
by: Maarif, Haris Al Qodri, et al.
Published: (2014)
Performance analysis of a free space optics link with multiple transmitters/receivers
by: Md Noor, Nur Haedzerin, et al.
Published: (2012)
by: Md Noor, Nur Haedzerin, et al.
Published: (2012)
Design and performance analysis of multiple transmitters/receivers on Free Space Optics(FSO) link
by: Md. Noor, Nur Haedzerin, et al.
Published: (2011)
by: Md. Noor, Nur Haedzerin, et al.
Published: (2011)
Theoretical analysis of multiple transmitters/receivers on the performance of Free Space Optics (FSO) link
by: Md Noor, Nur Haedzerin, et al.
Published: (2011)
by: Md Noor, Nur Haedzerin, et al.
Published: (2011)
Security improvement of credit card online purchasing system
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
An accurate method to obtain bio-metric measurements for three dimensional skull
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Effect of modulation index of pulse width modulation inverter on total harmonic distortion for sinusoidal
by: Aboadla, Eziddin Hassan Elmabrouk, et al.
Published: (2016)
by: Aboadla, Eziddin Hassan Elmabrouk, et al.
Published: (2016)
Effect of modulation index of pulse width modulation inverter on total harmonic distortion for sinusoidal
by: Aboadla, Ezzidin Hassan Elmabrouk, et al.
Published: (2016)
by: Aboadla, Ezzidin Hassan Elmabrouk, et al.
Published: (2016)
The effect of slicing jpeg file on the web page download time / Fakhrul Hazman Yusoff, Anita Mohd Yasin and Rozianawaty Osman
by: Yusoff, Fakhrul Hazman, et al.
Published: (2005)
by: Yusoff, Fakhrul Hazman, et al.
Published: (2005)
The effect of weather on free space optics communication (FSO) under tropical weather conditions and a proposed setup for measurement
by: Zabidi, Suriza Ahmad, et al.
Published: (2010)
by: Zabidi, Suriza Ahmad, et al.
Published: (2010)
Investigating of rain attenuation impact on Free Space Optics propagation in tropical region
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
Effects of rain intensity variation on rain attenuation prediction for Free Space Optics (FSO) links
by: Ahmad Zabidi, Suriza, et al.
Published: (2012)
by: Ahmad Zabidi, Suriza, et al.
Published: (2012)
Similar Items
-
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009) -
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)