Image manipulations analysis and detection methods for reflection-based attacks / Nor Bakiah Abd. Warif
The extensive use of digital images at this age has led to the content manipulations that misrepresent the information with malicious intent. This issue demands the requirement of digital image investigation to verify the sources and validate trustworthiness. One of the image manipulation techniques...
| Main Author: | Nor Bakiah, Abd. Warif |
|---|---|
| Format: | Thesis |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/8681/ http://studentsrepo.um.edu.my/8681/1/Nor_Bakiah.pdf http://studentsrepo.um.edu.my/8681/6/bakiah.pdf |
Similar Items
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
A comparative analysis on three duplication elements in copy-move forgery using patchmatch-based detection method
by: Nur Izzati, Nor Azaimi, et al.
Published: (2023)
by: Nur Izzati, Nor Azaimi, et al.
Published: (2023)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Remote to Local Attack Detection Using Supervised Neural Network
by: Iftikhar, Ahmad, et al.
Published: (2010)
by: Iftikhar, Ahmad, et al.
Published: (2010)
Effectiveness of structured query language injection attacks detection mechanisms
by: Mohamad, Nurul Zawiyah
Published: (2008)
by: Mohamad, Nurul Zawiyah
Published: (2008)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
by: Noor Syahirah, Nordin
Published: (2022)
by: Noor Syahirah, Nordin
Published: (2022)
An efficient detection model of selective forwarding attacks in wireless mesh networks
by: Khanam, Shapla, et al.
Published: (2012)
by: Khanam, Shapla, et al.
Published: (2012)
Digital Watermarking for Recovering Attack Areas of Medical Images using Spiral Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Evaluation of spiral pattern watermarking scheme for common attacks to social media images
by: Tiew, Boon Li, et al.
Published: (2022)
by: Tiew, Boon Li, et al.
Published: (2022)
Parameter estimation in computational systems biology models: a comparative study of initialization methods in global optimization
by: Muhammad Akmal, Remli, et al.
Published: (2022)
by: Muhammad Akmal, Remli, et al.
Published: (2022)
A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review
by: Nor Bakiah, Abd Warif, et al.
Published: (2022)
by: Nor Bakiah, Abd Warif, et al.
Published: (2022)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Data mining techniques for effective detection of distributed denial-of-service attacks
by: Lee, Yuen Hui
Published: (2024)
by: Lee, Yuen Hui
Published: (2024)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
A new efficient text detection method for image spam filtering
by: Al Muataz, Zubaidah, et al.
Published: (2015)
by: Al Muataz, Zubaidah, et al.
Published: (2015)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
Joux multicollisions attack in sponge construction
by: AlAhmad, Mohammad A., et al.
Published: (2013)
by: AlAhmad, Mohammad A., et al.
Published: (2013)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
Multimedia tutorial courseware on Jawi alphabets and numbers / Nor Fadhillah Abd Manap
by: Abd Manap, Nor Fadhillah
Published: (2005)
by: Abd Manap, Nor Fadhillah
Published: (2005)
Simulation System To Educate People On Phivisp Attack
by: Salman, Khairul Anuar
Published: (2023)
by: Salman, Khairul Anuar
Published: (2023)
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Similar Items
-
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019) -
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002) -
A comparative analysis on three duplication elements in copy-move forgery using patchmatch-based detection method
by: Nur Izzati, Nor Azaimi, et al.
Published: (2023) -
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010) -
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)