Adaptive minimum error least significant bit replacement method for steganography using JPG/JPEG and PNG files
ABSTRACT: Nowadays, the security of data transmission is one of the important aspects in digital data transmission. In this era, sending messages via computers or other gadgets are highly used, the attackers can easily intercept the data during transmission process. Therefore, if there is a secret m...
| Main Authors: | Wamiliana, Wamiliana, Usman, Mustofa, Azram, Mohammad, Elfaki, Faiz Ahmed Mohamed, Hijriani, Astria, Panditatwa, Pandya |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Sci.Int.(Lahore)
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/46784/ http://irep.iium.edu.my/46784/1/12631817701%2520a%25204987-4990%2520%2520WAMILIANA%2520--MATH--CO%2520AZRAM.pdf |
Similar Items
Some greedy based algorithms for multi periods degree constrained minimum spanning tree problem
by: Wamiliana, Wamiliana, et al.
Published: (2015)
by: Wamiliana, Wamiliana, et al.
Published: (2015)
Determining the pattern for 1- fault tolerant Hamiltonian cycle from generalized Petersen graph P(n,k)
by: Wamiliana, Wamiliana, et al.
Published: (2015)
by: Wamiliana, Wamiliana, et al.
Published: (2015)
Statistical model and prediction of pineapple plant weight
by: Usman, Mustofa, et al.
Published: (2015)
by: Usman, Mustofa, et al.
Published: (2015)
Classification of JPEG files by using extreme learning machine
by: Ali, Rabei Raad, et al.
Published: (2018)
by: Ali, Rabei Raad, et al.
Published: (2018)
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019)
by: Nur Shazana, Matri
Published: (2019)
Implementation of a logistic map to calculate the bits required for digital image steganography using the least significant bit (LSB) method
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023)
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023)
A review of digital forensics methods for JPEG file carving
by: ALI, RABEI RAAD, et al.
Published: (2018)
by: ALI, RABEI RAAD, et al.
Published: (2018)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
A review of wave-net identical learning & filling-in in a decomposition space of (JPG-JPEG) sampled images
by: Al-Azzawi, Alaa Khamees, et al.
Published: (2010)
by: Al-Azzawi, Alaa Khamees, et al.
Published: (2010)
Irregular total labeling on complete bipartite graph and union complete bipartite graphs
by: Daoud, Jamal Ibrahim, et al.
Published: (2010)
by: Daoud, Jamal Ibrahim, et al.
Published: (2010)
An improved file carver of intertwined jpeg images using X_myKarve
by: Abdullah, Nurul Azma
Published: (2014)
by: Abdullah, Nurul Azma
Published: (2014)
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018)
by: Taufik, Ichsan, et al.
Published: (2018)
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
Traid-bit embedding process on Arabic text steganography method
by: Din, Roshidi, et al.
Published: (2021)
by: Din, Roshidi, et al.
Published: (2021)
Medical image compression evaluation by JPEG and JPEG 2000
by: Haseeb, Shariq, et al.
Published: (2014)
by: Haseeb, Shariq, et al.
Published: (2014)
Strict Authentication Watermaking with Jpeg Compression (SAW-JPEG)
by: Jasni, Mohamad Zain
Published: (2008)
by: Jasni, Mohamad Zain
Published: (2008)
Bijak pilih kursus catat PNG tinggi
by: Metro Ahad,
Published: (2003)
by: Metro Ahad,
Published: (2003)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit
by: Abdullah Bamatraf, Abdullah Omar
Published: (2012)
by: Abdullah Bamatraf, Abdullah Omar
Published: (2012)
The effect of slicing jpeg file on the web page download time / Fakhrul Hazman Yusoff, Anita Mohd Yasin and Rozianawaty Osman
by: Yusoff, Fakhrul Hazman, et al.
Published: (2005)
by: Yusoff, Fakhrul Hazman, et al.
Published: (2005)
JPG 412 - Komputer Dan Pendidikan
by: PPJJ, Pusat Pengajian Jarak Jauh
Published: (2004)
by: PPJJ, Pusat Pengajian Jarak Jauh
Published: (2004)
JPG 412 - Komputer Dan Pendidikan
by: PPJJ, Pusat Pengajian Jarak Jauh
Published: (2004)
by: PPJJ, Pusat Pengajian Jarak Jauh
Published: (2004)
A new digital watermarking algorithm using combination of Least Significant Bit (LSB) and inverse bit
by: Bamatraf, Abdullah, et al.
Published: (2011)
by: Bamatraf, Abdullah, et al.
Published: (2011)
Implementing slicing technique on JPEG file-its impact on the download time / Fakhrul Hazman Yusoff, Anita Mohd Yasin and Rozianawaty Osman
Published: (2005)
Published: (2005)
JPEG2000 & JPEG : Objective And Subjective Quality Measures For Lossily Compressed Medical Images
by: Oh , Tick Hui
Published: (2003)
by: Oh , Tick Hui
Published: (2003)
JPEG2000 & JPEG : Objective And Subjective Quality Measures For Lossily Compressed Medical Images
by: Oh, Tick Hui
Published: (2003)
by: Oh, Tick Hui
Published: (2003)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
PNG provincial hospital boards' compliance with statutory financial reporting obligations
by: Shardlow, M., et al.
Published: (2012)
by: Shardlow, M., et al.
Published: (2012)
Earning a living in PNG: From subsistence to a cash economy
by: Curry, George, et al.
Published: (2012)
by: Curry, George, et al.
Published: (2012)
Compression in image recovery watermarking using PNG (Portable Network Graphic)
by: Chang, Billy Zhi Yang
Published: (2013)
by: Chang, Billy Zhi Yang
Published: (2013)
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
An adaptive minimum bit-error decision-feedback equalizer for UWB systems
by: Chung, Gwo Chin, et al.
Published: (2007)
by: Chung, Gwo Chin, et al.
Published: (2007)
Optimization of drill bit geometries for minimum thermal damage in bone drilling
by: Mohd Faizal, Ali Akhbar, et al.
Published: (2024)
by: Mohd Faizal, Ali Akhbar, et al.
Published: (2024)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Overcoming constraints to the establishment of collaborative marketing groups for coffee growers in the highlands of PNG
by: Murray-Prior, Roy, et al.
Published: (2009)
by: Murray-Prior, Roy, et al.
Published: (2009)
Parametric Cox’s Model for partly interval-censored data
with application to AIDS studies
by: Elfaki, Faiz Ahmed Mohamed, et al.
Published: (2012)
by: Elfaki, Faiz Ahmed Mohamed, et al.
Published: (2012)
Similar Items
-
Some greedy based algorithms for multi periods degree constrained minimum spanning tree problem
by: Wamiliana, Wamiliana, et al.
Published: (2015) -
Determining the pattern for 1- fault tolerant Hamiltonian cycle from generalized Petersen graph P(n,k)
by: Wamiliana, Wamiliana, et al.
Published: (2015) -
Statistical model and prediction of pineapple plant weight
by: Usman, Mustofa, et al.
Published: (2015) -
Classification of JPEG files by using extreme learning machine
by: Ali, Rabei Raad, et al.
Published: (2018) -
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019)