Impact of image perceptibility in steganography
This thesis discusses on the impact of image perceptibility in Image Steganography. By using the steganography to embed the secret message into the cover image. Method of the steganography will applied to the image perceptibility must be in either black and white or grey. The image of steganography...
| Main Author: | Phang, She Chin |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/12522/ http://umpir.ump.edu.my/id/eprint/12522/1/FSKKP%20-%20PHANG%20SHE%20CHIN.PDF |
Similar Items
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
An Improved Image Steganography Scheme Based on RDWT and QR Decomposition
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018)
by: Ng, Ke-Huey, et al.
Published: (2018)
Prototype development of VOIP steganography
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010)
by: Zamani, Mazdak
Published: (2010)
Steganography based on utilizing more surrounding pixels
by: Afrakhteh, Masoud
Published: (2010)
by: Afrakhteh, Masoud
Published: (2010)
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
by: Mehdi , Hussain
Published: (2017)
by: Mehdi , Hussain
Published: (2017)
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
An improved rdwt-based image steganography scheme using qr decomposition and human visual system
by: Ng, Ke Huey
Published: (2021)
by: Ng, Ke Huey
Published: (2021)
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
A new embedding technique based on psychovisual threshold for robust and secure compressed video steganography
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
Prototype development for embedding large amount of information using secure LSB and neural based steganography
by: Saleh, Basam N.
Published: (2009)
by: Saleh, Basam N.
Published: (2009)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Image steganography
by: Jeniffer, Chegaram
Published: (2012)
by: Jeniffer, Chegaram
Published: (2012)
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023)
by: Ernawan, Ferda
Published: (2023)
Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking
by: Ariatmanto, Dhani, et al.
Published: (2020)
by: Ariatmanto, Dhani, et al.
Published: (2020)
An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
Fragile Image Watermarking For Medical Images
by: Jasni, Mohamad Zain, et al.
Published: (2006)
by: Jasni, Mohamad Zain, et al.
Published: (2006)
Image binarization of historical document image
by: Mat Som, Hafizan
Published: (2007)
by: Mat Som, Hafizan
Published: (2007)
A Review of Image Segmentation Methodologies in Medical Image
by: Lee, Lay Khoon, et al.
Published: (2015)
by: Lee, Lay Khoon, et al.
Published: (2015)
Image editing
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image filtering
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
An analysis of alphabet-based techniques in text steganography
by: Osman, Baharudin, et al.
Published: (2016)
by: Osman, Baharudin, et al.
Published: (2016)
Critical analysis on steganography technique in text domain
by: Utama, Sunariya, et al.
Published: (2016)
by: Utama, Sunariya, et al.
Published: (2016)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
3D image extraction from 2D aerial image
by: Daman, Daut, et al.
Published: (2000)
by: Daman, Daut, et al.
Published: (2000)
Similar Items
-
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023) -
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019) -
An Improved Image Steganography Scheme Based on RDWT and QR Decomposition
by: Ng, Ke-Huey, et al.
Published: (2020) -
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018) -
Prototype development of VOIP steganography
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)