Detection of presence marks in stegocontent
Steganography is an art of hiding message by embedding message within other types of media for example text, audio or image files. The main purpose of Steganography is attempts to hide the existence of communication. For steganography, the users totally do not want to let anyone know they are sendin...
| Main Author: | Chia Meng, Sia |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/10640/ http://umpir.ump.edu.my/id/eprint/10640/1/Detection%20of%20presence%20marks%20in%20stegocontent.pdf |
Similar Items
Intelligent marking system for structured question/ Mastura Ariffin
by: Mastura, Ariffin
Published: (2002)
by: Mastura, Ariffin
Published: (2002)
Intelligent marking system for structured question / Mastura Arifin
by: Mastura, Arifin
Published: (2002)
by: Mastura, Arifin
Published: (2002)
Generating t-way Test Suite in the Presence of Constraints
by: Al-Sewari, Abdul Rahman Ahmed Mohammed, et al.
Published: (2014)
by: Al-Sewari, Abdul Rahman Ahmed Mohammed, et al.
Published: (2014)
Student Marks Management System (SMMS) / Tan Chee Choong
by: Tan, Chee Choong
Published: (2002)
by: Tan, Chee Choong
Published: (2002)
Handling Constraints in Combinatorial Interaction Testing in the Presence of Multi Objective Particle Swarm and Multithreading
by: Ahmed, Bestoun S., et al.
Published: (2017)
by: Ahmed, Bestoun S., et al.
Published: (2017)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Optimized feature construction methods for data summarization methods for data summarization of relational data
by: Florence Sia, Fui Sze
Published: (2014)
by: Florence Sia, Fui Sze
Published: (2014)
Evolutionary-based feature construction with substitution for data summarization using DARA
by: Sia, Florence, et al.
Published: (2012)
by: Sia, Florence, et al.
Published: (2012)
A demonstration of the FN packet marking probability
by: M. Kadhum, Mohammed, et al.
Published: (2009)
by: M. Kadhum, Mohammed, et al.
Published: (2009)
A carnivorous plant algorithm for solving global optimization
problems
by: Ong, Kok Meng, et al.
Published: (2021)
by: Ong, Kok Meng, et al.
Published: (2021)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
Die defect detection for integrated circuit using deep learning object detection techniques
by: Wong, Tack Hwa
Published: (2023)
by: Wong, Tack Hwa
Published: (2023)
Human motion detection framework
by: Suzaimah, Ramli, et al.
Published: (2011)
by: Suzaimah, Ramli, et al.
Published: (2011)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Vision-based Human Presence Detection by Means of Transfer Learning Approach
by: Tang, Jin Cheng, et al.
Published: (2022)
by: Tang, Jin Cheng, et al.
Published: (2022)
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
by: Then,, Patrick Hang Hui
Published: (2007)
by: Then,, Patrick Hang Hui
Published: (2007)
Data Integration Case Study for UUM ASIS Student's Marks
by: Al-Badareen, Anas Bassam
Published: (2008)
by: Al-Badareen, Anas Bassam
Published: (2008)
Street light malfunction detection system
by: Abdul Rahim, Ayub
Published: (2018)
by: Abdul Rahim, Ayub
Published: (2018)
Safety car detection with notification system
by: Nur Fathihah, Mashudi
Published: (2019)
by: Nur Fathihah, Mashudi
Published: (2019)
Fault detection using neural network
by: Dinie, Muhammad
Published: (2008)
by: Dinie, Muhammad
Published: (2008)
Epilepsy detection using EEG signals
by: Amer, Salam, et al.
Published: (2018)
by: Amer, Salam, et al.
Published: (2018)
Detecting JFIF header using FORHEADER
by: Kamaruddin Malik, Mohamad, et al.
Published: (2011)
by: Kamaruddin Malik, Mohamad, et al.
Published: (2011)
Analysis of Microscopic Blood Samples for Detecting Malaria
by: Saw Hui, Ann
Published: (2013)
by: Saw Hui, Ann
Published: (2013)
Neighbour replication on grid deadlock detection framework
by: Noriyani, Mohd Zin, et al.
Published: (2011)
by: Noriyani, Mohd Zin, et al.
Published: (2011)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Anti-Forgery Document Detection System (FDDS)
by: Rassem, Taha H., et al.
Published: (2018)
by: Rassem, Taha H., et al.
Published: (2018)
Flood water level detection for student notification
by: Nur Izzah Nadhirah, Abdul Majid
Published: (2018)
by: Nur Izzah Nadhirah, Abdul Majid
Published: (2018)
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
Effective detection of purchasing intention for online shopping
by: Kang, Shu Yi
Published: (2023)
by: Kang, Shu Yi
Published: (2023)
A review on distance measure formula for enhancing match detection process of generic code clone detection model in Java Application
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2021)
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2021)
Fine-tuned RetinaNet models for Vision-based Human Presence Detection
by: Tang, Jin Cheng, et al.
Published: (2022)
by: Tang, Jin Cheng, et al.
Published: (2022)
On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
Enhanced global and local curvature properties for corner detection
by: Suraya, Abu Bakar, et al.
Published: (2020)
by: Suraya, Abu Bakar, et al.
Published: (2020)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
A Static Approach towards Mobile Botnet Detection
by: Shahid, Anwar, et al.
Published: (2016)
by: Shahid, Anwar, et al.
Published: (2016)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Detection and avoidance technique of anomalous congestion at the network gateways
by: Ahmed, Abdulghani Ali
Published: (2018)
by: Ahmed, Abdulghani Ali
Published: (2018)
Detecting opinion spams through supervised boosting approach
by: Mohamad, Hazim, et al.
Published: (2018)
by: Mohamad, Hazim, et al.
Published: (2018)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
Masked face detection system using google firebase
by: Azman, Anis Zahirah
Published: (2021)
by: Azman, Anis Zahirah
Published: (2021)
Similar Items
-
Intelligent marking system for structured question/ Mastura Ariffin
by: Mastura, Ariffin
Published: (2002) -
Intelligent marking system for structured question / Mastura Arifin
by: Mastura, Arifin
Published: (2002) -
Generating t-way Test Suite in the Presence of Constraints
by: Al-Sewari, Abdul Rahman Ahmed Mohammed, et al.
Published: (2014) -
Student Marks Management System (SMMS) / Tan Chee Choong
by: Tan, Chee Choong
Published: (2002) -
Handling Constraints in Combinatorial Interaction Testing in the Presence of Multi Objective Particle Swarm and Multithreading
by: Ahmed, Bestoun S., et al.
Published: (2017)