Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Text digital watermarking,which is an important research direction for information hiding, can be used for copyright protection of text documents. Digital text protection received increasing attention in the last decade due to massive digital data documents via internet, hence digital watermarking w...
| Main Author: | Lew , Chee Hon |
|---|---|
| Format: | Thesis |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/11962/ http://studentsrepo.um.edu.my/11962/2/Lew_Chee_Hon.pdf http://studentsrepo.um.edu.my/11962/1/Lew_Chee_Hon.pdf |
Similar Items
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
An enhanced color image encryption algorithm using LT-PRNG
by: Mohammed Ismael, Saba
Published: (2018)
by: Mohammed Ismael, Saba
Published: (2018)
Meeting support system / Hon Tian Yang
by: Hon, Tian Yang
Published: (2001)
by: Hon, Tian Yang
Published: (2001)
Parking summon system for municipal councils / Yee Hon Weng
by: Yee, Hon Wong
Published: (2004)
by: Yee, Hon Wong
Published: (2004)
Malaysia tourism network games / Christopher Yip Wai Hon
by: Christopher Yip , Wai Hon
Published: (2006)
by: Christopher Yip , Wai Hon
Published: (2006)
Dynamic modelling of a two-stage ATM Tandem Banyan Switch / Tham Hon Loke
by: Tham , Hon Loke
Published: (2002)
by: Tham , Hon Loke
Published: (2002)
An ensemble-based regression model for perceived stress prediction using relevant personality traits / Chang Hon Fey
by: Chang , Hon Fey
Published: (2018)
by: Chang , Hon Fey
Published: (2018)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Curved text detection and ground truth generation for natural scene images / Ch’ng Chee Kheng
by: Ch’ng, Chee Kheng
Published: (2018)
by: Ch’ng, Chee Kheng
Published: (2018)
Digital Watermarking for Recovering Attack Areas of Medical Images using Spiral Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Scheme To Watermark Digital Text Documents
by: Tinauli, Musstanser
Published: (2007)
by: Tinauli, Musstanser
Published: (2007)
Pseudo Random Bits' Generator Based on Tent Chaotic Map and Linear Feedback Shift Register
by: Ahmed, Hussam Alddin S., et al.
Published: (2018)
by: Ahmed, Hussam Alddin S., et al.
Published: (2018)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Practical cryptography: algorithms and implementations using C++
Published: (2014)
Published: (2014)
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
Course Advisory System / Lee Chee Siong
by: Lee, Chee Siong
Published: (2004)
by: Lee, Chee Siong
Published: (2004)
e-Scientific Calculator / Liew Chee Kit
by: Liew , Chee Kit
Published: (2002)
by: Liew , Chee Kit
Published: (2002)
Online Reservation System / Chee Kim Shih
by: Chee , Kim Shih
Published: (2002)
by: Chee , Kim Shih
Published: (2002)
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)
by: TEOH, A, et al.
Published: (2005)
Dynamic screen painter / Yee Chee Huan
by: Yee, Chee Huan
Published: (2004)
by: Yee, Chee Huan
Published: (2004)
Student Marks Management System (SMMS) / Tan Chee Choong
by: Tan, Chee Choong
Published: (2002)
by: Tan, Chee Choong
Published: (2002)
Client/server connection establishing and configuration / Loo Chee Keong
by: Loo , Chee Keong
Published: (2002)
by: Loo , Chee Keong
Published: (2002)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
Dynamics of watermark position in audio watermarked
files using neural networks
by: Abubakar, Adamu, et al.
Published: (2017)
by: Abubakar, Adamu, et al.
Published: (2017)
A set of embedding rules in IWT for watermark embedding in image watermarking
by: Muhammad Afnan, Hafidz, et al.
Published: (2024)
by: Muhammad Afnan, Hafidz, et al.
Published: (2024)
e-Expense Claims System / Chong Chee Fui
by: Chong , Chee Fui
Published: (2001)
by: Chong , Chee Fui
Published: (2001)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
Watermarking of Ultrasound Medical Images in Teleradiology Using Compressed Watermark
by: Gran, Badshah, et al.
Published: (2016)
by: Gran, Badshah, et al.
Published: (2016)
E-Computer Shop System (ECSS) / Lor Chee Loong
by: Lor , Chee Loong
Published: (2003)
by: Lor , Chee Loong
Published: (2003)
Digital Watermarking in Medical Images
by: Jasni, Mohamad Zain
Published: (2005)
by: Jasni, Mohamad Zain
Published: (2005)
Fingerprint Watermarking with Tamper Detection
by: Jasni, Mohamad Zain, et al.
Published: (2006)
by: Jasni, Mohamad Zain, et al.
Published: (2006)
CSC 535 � CRYPTOGRAPHY FEB 99.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
Robust Image Watermarking based on Psychovisual Threshold
by: Ernawan, Ferda
Published: (2016)
by: Ernawan, Ferda
Published: (2016)
XML Digital Watermarking
by: Khalid, Edris, et al.
Published: (2013)
by: Khalid, Edris, et al.
Published: (2013)
Similar Items
-
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020) -
An enhanced color image encryption algorithm using LT-PRNG
by: Mohammed Ismael, Saba
Published: (2018) -
Meeting support system / Hon Tian Yang
by: Hon, Tian Yang
Published: (2001) -
Parking summon system for municipal councils / Yee Hon Weng
by: Yee, Hon Wong
Published: (2004) -
Malaysia tourism network games / Christopher Yip Wai Hon
by: Christopher Yip , Wai Hon
Published: (2006)