Concealment of files blocked by Gmail with EOF-based image steganography
Nowadays, due to security concern, not all the process of sending files via email runs smoothly. There are several types of file extensions that are blocked when sent via email. For examples, there are several file extensions blocked by Gmail. This paper discusses steganographic implementation using...
| Main Authors: | Taufik, Ichsan, Syaripudin, Undang, Kaffah, Faiz M., Ismail, Nanang, Sobirin, Jaka Giri, Gunawan, Teddy Surya |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Institute of Advanced Engineering and Science
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/66219/ http://irep.iium.edu.my/66219/1/66219_Concealment%20of%20Files%20Blocked.pdf http://irep.iium.edu.my/66219/2/66219_Concealment%20of%20Files%20Blocked_SCOPUS.pdf |
Similar Items
High gain UWB horn antenna for concealed metal detection and microwave imaging application
by: Shaikh, Faraz Ahmed, et al.
Published: (2018)
by: Shaikh, Faraz Ahmed, et al.
Published: (2018)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
An artificial-intelligence-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Performance evaluation of multichannel audio compression
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
On the comparison of line spectral frequencies and mel-frequency cepstral coefficients using feedforward neural network for language identification
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
On the use of edge features and exponential decaying number of nodes in the hidden layers for handwritten signature recognition
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Online information seeking behavior for cancer related disease: A developed and developing country comparison
by: Saleh, Nurliyana, et al.
Published: (2018)
by: Saleh, Nurliyana, et al.
Published: (2018)
Automatic Number Plate Recognition on android platform: With some Java code excerpts
by: ., Abdul Mutholib, et al.
Published: (2016)
by: ., Abdul Mutholib, et al.
Published: (2016)
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Speech emotion recognition using deep feedforward neural network
by: Alghifari, Muhammad Fahreza, et al.
Published: (2018)
by: Alghifari, Muhammad Fahreza, et al.
Published: (2018)
The Requirement Analysis of An Offline Automated Invigilation System with Gmail Alert Integration
by: A., Eenaja, et al.
Published: (2025)
by: A., Eenaja, et al.
Published: (2025)
Portable anti forgery recognition for attendance system using fingerprint based biometric
by: Zainal, Nur Izzati, et al.
Published: (2016)
by: Zainal, Nur Izzati, et al.
Published: (2016)
Smart home system using internet of things: design, implementation and sample codes
by: Yaldi, Intan Rahmithul Husna, et al.
Published: (2018)
by: Yaldi, Intan Rahmithul Husna, et al.
Published: (2018)
Fast and accurate algorithm for ECG authentication using residual depthwise separable convolutional neural networks
by: Ihsanto, Eko, et al.
Published: (2020)
by: Ihsanto, Eko, et al.
Published: (2020)
Herb leaves pattern recognition using digital microscope and deep learning
by: Rahman, Muhammad Ariff Azizul, et al.
Published: (2019)
by: Rahman, Muhammad Ariff Azizul, et al.
Published: (2019)
An efficient algorithm for cardiac arrhythmia classification using ensemble of depthwise Separable convolutional neural networks
by: Ihsanto, Eko, et al.
Published: (2020)
by: Ihsanto, Eko, et al.
Published: (2020)
Development of English handwritten recognition using deep neural network
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Measuring the road traffic intensity using neural network with computer vision
by: Hasan Gani, Muhammad Hamdan, et al.
Published: (2018)
by: Hasan Gani, Muhammad Hamdan, et al.
Published: (2018)
On the review and setup of security audit using Kali Linux
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
A review on emotion recognition algorithms using speech analysis
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
A summarization of image and video databases for emotion recognition
by: Ashraf, Arselan, et al.
Published: (2020)
by: Ashraf, Arselan, et al.
Published: (2020)
Speech emotion recognition using feature fusion of TEO and MFCC on multilingual databases
by: Ahmad Qadri, Syed Asif, et al.
Published: (2020)
by: Ahmad Qadri, Syed Asif, et al.
Published: (2020)
Comparison of entropy coding mechanism on IEEE1857.2 lossless audio compression standard
by: Abdul Muin, Fathiah, et al.
Published: (2018)
by: Abdul Muin, Fathiah, et al.
Published: (2018)
The disruptometer: an artificial intelligence algorithm for market insights
by: Wan Nordin, Mimi Aminah, et al.
Published: (2019)
by: Wan Nordin, Mimi Aminah, et al.
Published: (2019)
Performance evaluation of portable air quality measurement
system using raspberry Pi for remote monitoring
by: Mohd Pu’ad, Muhammad Farhan, et al.
Published: (2019)
by: Mohd Pu’ad, Muhammad Farhan, et al.
Published: (2019)
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
Development of smart chicken poultry farm
by: Mansor, Hasmah, et al.
Published: (2018)
by: Mansor, Hasmah, et al.
Published: (2018)
Fingerprint biometric systems
by: Yahya, Faridah, et al.
Published: (2016)
by: Yahya, Faridah, et al.
Published: (2016)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
A critical insight into multi-languages speech emotion databases
by: Ahmad Qadri, Syed Asif, et al.
Published: (2019)
by: Ahmad Qadri, Syed Asif, et al.
Published: (2019)
Effect of modulation index of pulse width modulation inverter on total harmonic distortion for sinusoidal
by: Aboadla, Eziddin Hassan Elmabrouk, et al.
Published: (2016)
by: Aboadla, Eziddin Hassan Elmabrouk, et al.
Published: (2016)
Development of low bit rate speech encoder based on vector quantization and compressive sensing
by: Kassim, Liban A. S., et al.
Published: (2012)
by: Kassim, Liban A. S., et al.
Published: (2012)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
Sukuk rating prediction using voting ensemble strategy
by: Kartiwi, Mira, et al.
Published: (2018)
by: Kartiwi, Mira, et al.
Published: (2018)
Decision tree optimization for sukuk rating prediction
by: Kartiwi, Mira, et al.
Published: (2018)
by: Kartiwi, Mira, et al.
Published: (2018)
Objective methods for reliable detection of concealed depression
by: Solomon, Cynthia, et al.
Published: (2015)
by: Solomon, Cynthia, et al.
Published: (2015)
Objective methods for reliable detection of concealed depression
by: Solomon, Cynthia, et al.
Published: (2015)
by: Solomon, Cynthia, et al.
Published: (2015)
Similar Items
-
High gain UWB horn antenna for concealed metal detection and microwave imaging application
by: Shaikh, Faraz Ahmed, et al.
Published: (2018) -
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013) -
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
An artificial-intelligence-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009) -
Performance evaluation of multichannel audio compression
by: Gunawan, Teddy Surya, et al.
Published: (2018)