Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
In security system, there is an information hiding technique used to conceal the information which is called steganography. Steganography is a technique used to hide covert messages without raising suspicion from the other recipients on the communication. Some of the steganography tools nowadays wer...
| Main Author: | Mohd Aminnuddin, Farabi Aizat |
|---|---|
| Format: | Student Project |
| Language: | English |
| Published: |
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Perlis
2019
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/26855/ |
Similar Items
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019)
by: Nur Shazana, Matri
Published: (2019)
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018)
by: Taufik, Ichsan, et al.
Published: (2018)
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
by: Edris, Khalid Edris, et al.
Published: (2014)
by: Edris, Khalid Edris, et al.
Published: (2014)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Implementation of a logistic map to calculate the bits required for digital image steganography using the least significant bit (LSB) method
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023)
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Spiral bit-map signature for content-based images retrieval
by: Wang, Hui Hui
Published: (2003)
by: Wang, Hui Hui
Published: (2003)
An intermediate significant bit (ISB) watermarking technique using neural networks
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
An Efficient Image Compression Technique using Tchebichef Bit Allocation
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2009)
by: Zeki, Akram M., et al.
Published: (2009)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Stemming engine for Bahasa Melayu words / Muhammad Aizat Abdul Rahman
by: Muhammad Aizat, Abdul Rahman
Published: (2006)
by: Muhammad Aizat, Abdul Rahman
Published: (2006)
Tracing Significant Association Rules Using Critical Least Association Rules Model
by: Zailani, Abdullah, et al.
Published: (2013)
by: Zailani, Abdullah, et al.
Published: (2013)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
by: Mehdi , Hussain
Published: (2017)
by: Mehdi , Hussain
Published: (2017)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Adaptive minimum error least significant bit replacement method for steganography using JPG/JPEG and PNG files
by: Wamiliana, Wamiliana, et al.
Published: (2015)
by: Wamiliana, Wamiliana, et al.
Published: (2015)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Reversible data hiding scheme based on 3-Least significant bits and mix column transform
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Designing and developing mobile application for college resident / Muhammad Amirul Aizat Mohd Rosdi
by: Mohd Rosdi, Muhammad Amirul Aizat
Published: (2020)
by: Mohd Rosdi, Muhammad Amirul Aizat
Published: (2020)
High gain UWB horn antenna for concealed metal detection and microwave imaging application
by: Shaikh, Faraz Ahmed, et al.
Published: (2017)
by: Shaikh, Faraz Ahmed, et al.
Published: (2017)
Secret channel using video steganography
by: Lee, Kar Yee, et al.
Published: (2017)
by: Lee, Kar Yee, et al.
Published: (2017)
A secured data hiding using affine transformation in video steganography
by: Ramalingam, Mritha, et al.
Published: (2020)
by: Ramalingam, Mritha, et al.
Published: (2020)
High gain UWB horn antenna for concealed metal detection and microwave imaging application
by: Shaikh, Faraz Ahmed, et al.
Published: (2018)
by: Shaikh, Faraz Ahmed, et al.
Published: (2018)
An Improved Image Steganography Scheme Based on RDWT and QR Decomposition
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018)
by: Ng, Ke-Huey, et al.
Published: (2018)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Image steganography
by: Jeniffer, Chegaram
Published: (2012)
by: Jeniffer, Chegaram
Published: (2012)
WLAR-Viz: Weighted least association rules visualization
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
A new robust image watermarking method using Dual Intermediate Significant Bits
by: Mohammed, Ghassan N., et al.
Published: (2014)
by: Mohammed, Ghassan N., et al.
Published: (2014)
Clinical assessment of watermarked medical images
by: Mohamad Zain, Jasni, et al.
Published: (2009)
by: Mohamad Zain, Jasni, et al.
Published: (2009)
32-bit 5-stage RISC pipeline processor with 2-Bit dynamic branch prediction functionality
by: Chang, Boon Chiao
Published: (2015)
by: Chang, Boon Chiao
Published: (2015)
A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm
by: Yasin, Azman, et al.
Published: (2013)
by: Yasin, Azman, et al.
Published: (2013)
Similar Items
-
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019) -
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018) -
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
by: Edris, Khalid Edris, et al.
Published: (2014) -
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013) -
Implementation of a logistic map to calculate the bits required for digital image steganography using the least significant bit (LSB) method
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023)