Preserving the confidentiality of final examination question paper using image steganography technique / Aviefieorennia Tompell
Nowadays, examination is one of the important process in education. It is either done orally, in the form of written paper and practiced-based examination as well as participating in a course work. The rapid and constant paces of technology changing are creating both opportunities and challenges for...
| Main Author: | Tompell, Aviefieorennia |
|---|---|
| Format: | Student Project |
| Language: | English |
| Published: |
Faculty of Computer and Mathematical Sciences
2016
|
| Online Access: | https://ir.uitm.edu.my/id/eprint/18138/ |
Similar Items
Final examination question generator using microsoft word's macro
by: Hoong, Adrian Yong Weng
Published: (2014)
by: Hoong, Adrian Yong Weng
Published: (2014)
Image steganography
by: Jeniffer, Chegaram
Published: (2012)
by: Jeniffer, Chegaram
Published: (2012)
Digital examination question paper maker and analyser / Eng Cheng Kait
by: Eng , Cheng Kait
Published: (2004)
by: Eng , Cheng Kait
Published: (2004)
Confidentiality
by: Jahn Kassim, Puteri Nemie
Published: (2019)
by: Jahn Kassim, Puteri Nemie
Published: (2019)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
You Have My Word Confronting Critical Questions Involving Journalists’ Promises and Confidential Sources
by: Fernandez, Joseph
Published: (2015)
by: Fernandez, Joseph
Published: (2015)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Steganography For Embedding Data In Digital Image
by: Sowan, Salah Ibrahem
Published: (2003)
by: Sowan, Salah Ibrahem
Published: (2003)
A Robust Cover Generation Technique for Steganography Using 2D Images
by: Ahmad Zawawi, Md. Nabil
Published: (2006)
by: Ahmad Zawawi, Md. Nabil
Published: (2006)
Developing a learning outcome-based question examination paper tool for Universiti Putra Malaysia
by: Hassan, Sa'adah, et al.
Published: (2016)
by: Hassan, Sa'adah, et al.
Published: (2016)
Steganography technique using modulus arithmetic
by: Jaafar, Sayuthi, et al.
Published: (2007)
by: Jaafar, Sayuthi, et al.
Published: (2007)
Patient Confidentiality - revisited
by: Mohammad Amjad, Nasser
Published: (2013)
by: Mohammad Amjad, Nasser
Published: (2013)
An improved image steganography algorithm based on PVD
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
Final examinations
by: Ismail, Yusof
Published: (2011)
by: Ismail, Yusof
Published: (2011)
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010)
by: Zamani, Mazdak
Published: (2010)
Shuffling algorithms for automatic generator question paper system.
by: Mohd Jamail, Nor Shahida, et al.
Published: (2010)
by: Mohd Jamail, Nor Shahida, et al.
Published: (2010)
Method and system for steganography within handwritten signature images
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
Steganography algorithm to hide secret message inside an image
by: Ibrahim, Rosziati, et al.
Published: (2011)
by: Ibrahim, Rosziati, et al.
Published: (2011)
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018)
by: Taufik, Ichsan, et al.
Published: (2018)
An Improved Image Steganography Scheme Based on RDWT and QR Decomposition
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018)
by: Ng, Ke-Huey, et al.
Published: (2018)
Banker's duty of confidentiality: withering away?
by: Mohd. Yasin, Norhashimah
Published: (2015)
by: Mohd. Yasin, Norhashimah
Published: (2015)
Legal and ethical dimensions of consent and confidentiality
by: Jahn Kassim, Puteri Nemie
Published: (2017)
by: Jahn Kassim, Puteri Nemie
Published: (2017)
Informed consent and confidentiality in military setting
by: Jahn Kassim, Puteri Nemie
Published: (2019)
by: Jahn Kassim, Puteri Nemie
Published: (2019)
Business Plan - Scholar Warriors (confidential)
by: Aujla, Kamaljit
Published: (2013)
by: Aujla, Kamaljit
Published: (2013)
Lights In - A Business Plan (Confidential)
by: Dunn, Matthew J.
Published: (2015)
by: Dunn, Matthew J.
Published: (2015)
Confidentiality to service medical emergency model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Protection of Confidential Information in the Engineering Industry
by: Sadler, Pauline
Published: (2005)
by: Sadler, Pauline
Published: (2005)
Efficient and secured compression and steganography technique in wireless sensor network
by: Tuama, Ammar Yaseen
Published: (2016)
by: Tuama, Ammar Yaseen
Published: (2016)
The evaluation performance of letter-based techniques on text steganography method
by: Ismail, Azizan, et al.
Published: (2018)
by: Ismail, Azizan, et al.
Published: (2018)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Electronic Question Paper System (EQPS). UiTM Library Guide
by: UiTM, Perpustakaan Tun Abdul Razak
Published: (2017)
by: UiTM, Perpustakaan Tun Abdul Razak
Published: (2017)
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
Application of rasch model in measuring the quality of health and wellness final exam questions
by: Norlia Goolamally,, et al.
Published: (2019)
by: Norlia Goolamally,, et al.
Published: (2019)
Similar Items
-
Final examination question generator using microsoft word's macro
by: Hoong, Adrian Yong Weng
Published: (2014) -
Image steganography
by: Jeniffer, Chegaram
Published: (2012) -
Digital examination question paper maker and analyser / Eng Cheng Kait
by: Eng , Cheng Kait
Published: (2004) -
Confidentiality
by: Jahn Kassim, Puteri Nemie
Published: (2019) -
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)