Receiver operating characteristic (ROC) graph to determine the most suitable pairs analysis threshold value
Steganography is the art of hiding the information that is going to be sent from one party to another. Information can be hidden into image, te xt, audio or video. Steganography allowed communication to happen without other people notice there is transmission of message except the intended party. Th...
| Main Authors: | Patah Akhir, Emelia Akashah, S.K., Sugathan, A.T.S., Ho |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/187/ http://scholars.utp.edu.my/id/eprint/187/1/paper.pdf |
Similar Items
Choosing among media alternatives for advertising – A case study
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
MOBILE COMMERCE READINESS AMONG MALAYSIAN YOUTH
by: K. Sugathan , Savita, et al.
Published: (2009)
by: K. Sugathan , Savita, et al.
Published: (2009)
Preservers of pairs of bivectors with bounded distance
by: Lim, Ming-Huat, et al.
Published: (2009)
by: Lim, Ming-Huat, et al.
Published: (2009)
A Study on Graphs of Rings
by: Lau, Zhou Sheng
Published: (2019)
by: Lau, Zhou Sheng
Published: (2019)
Single-row transformation of complete graphs
by: Salleh, Shahruddin Hussain, et al.
Published: (2005)
by: Salleh, Shahruddin Hussain, et al.
Published: (2005)
Pair Bonds In Genetic Algorithm
by: Lim , Ting Yee
Published: (2015)
by: Lim , Ting Yee
Published: (2015)
The most interesting places in Malaysia multimedia interactive presentation / Nik Rozilah Nik Yaacob
by: Nik Yaacob, Nik Rozilah
Published: (2005)
by: Nik Yaacob, Nik Rozilah
Published: (2005)
Quantum Markov fields on graphs
by: Accardi, Luigi, et al.
Published: (2010)
by: Accardi, Luigi, et al.
Published: (2010)
Power Dominating Numbers In Graphs
by: Chan, Kar Man
Published: (2021)
by: Chan, Kar Man
Published: (2021)
Legacy Model Reconfiguration Using Graph-Theoretic
by: Azween, Abdullah
Published: (2008)
by: Azween, Abdullah
Published: (2008)
Legacy Model Reconfiguration Using Graph-Theoretic
by: Azween, Abdullah
Published: (2008)
by: Azween, Abdullah
Published: (2008)
Image matching using relational graph representation
by: Lai, Chui Yen
Published: (2005)
by: Lai, Chui Yen
Published: (2005)
PM : Arif Shah the most suitable candidate
Published: (2009)
Published: (2009)
Multi-training sensor networks with bipartite conflict graphs
by: Ishak, Ruzana, et al.
Published: (2006)
by: Ishak, Ruzana, et al.
Published: (2006)
Compatible pairs of actions for finite cyclic 2-groups and the associated compatible action graphs
by: Sahimel Azwal, Sulaiman
Published: (2018)
by: Sahimel Azwal, Sulaiman
Published: (2018)
Robust Image Watermarking based on Psychovisual Threshold
by: Ernawan, Ferda
Published: (2016)
by: Ernawan, Ferda
Published: (2016)
Five hundred most-cited papers in the computer sciences: Trends, relationships and common factors
by: Teh, Phoey Lee *, et al.
Published: (2021)
by: Teh, Phoey Lee *, et al.
Published: (2021)
Detection of cracked digitized paintings and manuscripts
based on threshold techniques
by: abdulwahab, Nawafil, et al.
Published: (2019)
by: abdulwahab, Nawafil, et al.
Published: (2019)
Bit Allocation Strategy Based on Psychovisual Threshold in Image Compression
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Textured Renyl Entropy for Image Thresholding
by: Abu Shareha, Ahmad Adel, et al.
Published: (2008)
by: Abu Shareha, Ahmad Adel, et al.
Published: (2008)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Distance based thresholds for 2-tier relay nodes selection in WSN
by: Azamuddin, Abdul Rahman, et al.
Published: (2019)
by: Azamuddin, Abdul Rahman, et al.
Published: (2019)
Design and Development Methodology of ‘Komputer Saya’: Multimedia Courseware for Slow Learners
by: Abdollah, Norfarhana, et al.
Published: (2010)
by: Abdollah, Norfarhana, et al.
Published: (2010)
Adaptive global reasoning with multiple knowledge graphs for object detection / Tao Bo
by: Tao , Bo
Published: (2021)
by: Tao , Bo
Published: (2021)
Kernel smoothing for ROC curve and estimation for thyroid
stimulating hormone
by: Tazhibi Mehdi,, et al.
Published: (2011)
by: Tazhibi Mehdi,, et al.
Published: (2011)
Morphological and Otsu Thresholding Based Retinal Blood Vessel Segmentation for Detection of Retinopathy.
by: Kipli, Kuryati, et al.
Published: (2017)
by: Kipli, Kuryati, et al.
Published: (2017)
Block-based Tchebichef image watermarking scheme using psychovisual threshold
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
by: Mehdi , Hussain
Published: (2017)
by: Mehdi , Hussain
Published: (2017)
Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs
by: Qureshi, MA., et al.
Published: (2010)
by: Qureshi, MA., et al.
Published: (2010)
On the medium access control protocols suitable for wireless sensor networks – a survey
by: Guerroumi, Mohamed, et al.
Published: (2014)
by: Guerroumi, Mohamed, et al.
Published: (2014)
Development of images segmentation using image thresholder and batch processing technique on the blood smears
by: Al-Shoukry, Suhad, et al.
Published: (2022)
by: Al-Shoukry, Suhad, et al.
Published: (2022)
A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Transient entropy squeezing of a single-Cooper-pair box placed inside a phase-damped cavity
by: Abdel-Shafi F., Obada, et al.
Published: (2008)
by: Abdel-Shafi F., Obada, et al.
Published: (2008)
A new embedding technique based on psychovisual threshold for robust and secure compressed video steganography
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
Improved K-means clustering and adaptive distance threshold for energy reduction in WSN-IoTs
by: Azamuddin, Ab Rahman, et al.
Published: (2025)
by: Azamuddin, Ab Rahman, et al.
Published: (2025)
Electronic document management system
by: Patah Akhir, Emelia Akashah, et al.
Published: (2011)
by: Patah Akhir, Emelia Akashah, et al.
Published: (2011)
An improved image compression technique using large adaptive DCT psychovisual thresholds
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
Dynamic threshold and quality meter based routing for cooperative broadband wireless networks
by: Chong, Eng Tan, et al.
Published: (2009)
by: Chong, Eng Tan, et al.
Published: (2009)
A Hybrid ACO-Graph Entropy for Functional Modules Detection From Protein-Protein Interaction Network
by: Jamaludin, Sallim, et al.
Published: (2018)
by: Jamaludin, Sallim, et al.
Published: (2018)
A review of the one registration system for contractors (1RoC)
by: Abdul Rashid, Khairuddin, et al.
Published: (2016)
by: Abdul Rashid, Khairuddin, et al.
Published: (2016)
Similar Items
-
Choosing among media alternatives for advertising – A case study
by: P.D.D., Dominic, et al.
Published: (2009) -
MOBILE COMMERCE READINESS AMONG MALAYSIAN YOUTH
by: K. Sugathan , Savita, et al.
Published: (2009) -
Preservers of pairs of bivectors with bounded distance
by: Lim, Ming-Huat, et al.
Published: (2009) -
A Study on Graphs of Rings
by: Lau, Zhou Sheng
Published: (2019) -
Single-row transformation of complete graphs
by: Salleh, Shahruddin Hussain, et al.
Published: (2005)