Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
The rapid advancement in digital computation, communication and exponential proliferation of the Internet has now become the easiest and economical way of data transmission. This evolution has gained the drawbacks in the advancement of forgery tools and application that enable perpetrators to steal,...
| Main Author: | Mehdi , Hussain |
|---|---|
| Format: | Thesis |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/8117/ http://studentsrepo.um.edu.my/8117/1/All.pdf http://studentsrepo.um.edu.my/8117/6/mehdi.pdf |
Similar Items
A microservice-based architecture for an online product review analysis system / Mehdi Mohammadi
by: Mehdi , Mohammadi
Published: (2021)
by: Mehdi , Mohammadi
Published: (2021)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad
by: Mehdi , Jahanirad
Published: (2016)
by: Mehdi , Jahanirad
Published: (2016)
DCT domain Stegasvm-shifted LSB model for highly
imperceptible and robust cover-image / Hanizan Shaker Hussain
by: Shaker Hussain, Hanizan
Published: (2014)
by: Shaker Hussain, Hanizan
Published: (2014)
A feature-based dual-layer ensemble classification method for emotional state recognition / Mehdi Malekzadeh
by: Mehdi , Malekzadeh
Published: (2017)
by: Mehdi , Malekzadeh
Published: (2017)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019)
by: Nur Shazana, Matri
Published: (2019)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
Adaptive minimum error least significant bit replacement method for steganography using JPG/JPEG and PNG files
by: Wamiliana, Wamiliana, et al.
Published: (2015)
by: Wamiliana, Wamiliana, et al.
Published: (2015)
Development and analysis of spatial domain and transform domain watermarking technique
by: Chua, Kah Keong
Published: (2011)
by: Chua, Kah Keong
Published: (2011)
Development of calcium silicate composites for bone tissue engineering / Mehdi Mehrali
by: Mehdi, Mehrali
Published: (2015)
by: Mehdi, Mehrali
Published: (2015)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
Prototype development of VOIP steganography
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
Traid-bit embedding process on Arabic text steganography method
by: Din, Roshidi, et al.
Published: (2021)
by: Din, Roshidi, et al.
Published: (2021)
A security framework for mobile health applications on android platform / Muzammil Hussain
by: Muzammil , Hussain
Published: (2017)
by: Muzammil , Hussain
Published: (2017)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010)
by: Zamani, Mazdak
Published: (2010)
Steganography based on utilizing more surrounding pixels
by: Afrakhteh, Masoud
Published: (2010)
by: Afrakhteh, Masoud
Published: (2010)
A Novel Un-differenced PPP-RTK Concept
by: Zhang, B., et al.
Published: (2011)
by: Zhang, B., et al.
Published: (2011)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
A study on participatory management and conservation of mangrove ecosystem in Matang and Carey Island, Malaysia / Mehdi Almasi
by: Mehdi , Almasi
Published: (2018)
by: Mehdi , Almasi
Published: (2018)
Development and application of a dynamic conflict resolution method for integrated water resources management / Mehdi Zomorodian
by: Mehdi , Zomorodian
Published: (2018)
by: Mehdi , Zomorodian
Published: (2018)
Implementation of a logistic map to calculate the bits required for digital image steganography using the least significant bit (LSB) method
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023)
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023)
An Improved Image Steganography Scheme Based on RDWT and QR Decomposition
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018)
by: Ng, Ke-Huey, et al.
Published: (2018)
An artificial-intelligence-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Secret channel using video steganography
by: Lee, Kar Yee, et al.
Published: (2017)
by: Lee, Kar Yee, et al.
Published: (2017)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Similar Items
-
A microservice-based architecture for an online product review analysis system / Mehdi Mohammadi
by: Mehdi , Mohammadi
Published: (2021) -
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015) -
Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad
by: Mehdi , Jahanirad
Published: (2016) -
DCT domain Stegasvm-shifted LSB model for highly
imperceptible and robust cover-image / Hanizan Shaker Hussain
by: Shaker Hussain, Hanizan
Published: (2014) -
A feature-based dual-layer ensemble classification method for emotional state recognition / Mehdi Malekzadeh
by: Mehdi , Malekzadeh
Published: (2017)