Steganography application for x-ray image of the transferred patient using least significant bit method
Nowadays, internet seems to be really important since it is one of the most effective ways to communicate. The growth of data transmitting over the internet helps healthcare management for easy access and distribution of patient’s information. However, the patient’s information that being transferre...
| Main Author: | Nur Shazana, Matri |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/26641/ http://umpir.ump.edu.my/id/eprint/26641/1/Steganography%20application%20for%20x-ray%20image%20of%20the%20transferred%20patient%20using%20least%20significant%20bit.pdf |
Similar Items
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
Implementation of a logistic map to calculate the bits required for digital image steganography using the least significant bit (LSB) method
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023)
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023)
Adaptive minimum error least significant bit replacement method for steganography using JPG/JPEG and PNG files
by: Wamiliana, Wamiliana, et al.
Published: (2015)
by: Wamiliana, Wamiliana, et al.
Published: (2015)
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
by: Edris, Khalid Edris, et al.
Published: (2014)
by: Edris, Khalid Edris, et al.
Published: (2014)
An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit
by: Abdullah Bamatraf, Abdullah Omar
Published: (2012)
by: Abdullah Bamatraf, Abdullah Omar
Published: (2012)
A new digital watermarking algorithm using combination of Least Significant Bit (LSB) and inverse bit
by: Bamatraf, Abdullah, et al.
Published: (2011)
by: Bamatraf, Abdullah, et al.
Published: (2011)
Traid-bit embedding process on Arabic text steganography method
by: Din, Roshidi, et al.
Published: (2021)
by: Din, Roshidi, et al.
Published: (2021)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Least Significant Bit (LSB) and Random Right
Circular Shift (RRCF) in digital watermarking
by: Kurdi, Moustafa M., et al.
Published: (2016)
by: Kurdi, Moustafa M., et al.
Published: (2016)
Reversible data hiding scheme based on 3-Least significant bits and mix column transform
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Detecting covid-19 in x-ray images with deep learning
by: Aw, Ethel Miao Han
Published: (2023)
by: Aw, Ethel Miao Han
Published: (2023)
Image steganography
by: Jeniffer, Chegaram
Published: (2012)
by: Jeniffer, Chegaram
Published: (2012)
An intermediate significant bit (ISB) watermarking technique using neural networks
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
A new robust image watermarking method using Dual intermediate significant bits
by: Mohammed, Ghassan N., et al.
Published: (2014)
by: Mohammed, Ghassan N., et al.
Published: (2014)
Comparative Analysis of Pneumonia Detection from Chest X-Ray Images Using CNN And Transfer Learning
by: Naveen Kumar, M., et al.
Published: (2024)
by: Naveen Kumar, M., et al.
Published: (2024)
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2009)
by: Zeki, Akram M., et al.
Published: (2009)
Tracing Significant Association Rules Using Critical Least Association Rules Model
by: Zailani, Abdullah, et al.
Published: (2013)
by: Zailani, Abdullah, et al.
Published: (2013)
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
by: Mehdi , Hussain
Published: (2017)
by: Mehdi , Hussain
Published: (2017)
Robust image watermarking based on Dual Intermediate Significant Bit (DISB)
by: Mohammed, Ghassan N., et al.
Published: (2014)
by: Mohammed, Ghassan N., et al.
Published: (2014)
An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
GS 2000+25: The Least Luminous Black Hole X-Ray Binary
by: Rodriguez, J., et al.
Published: (2020)
by: Rodriguez, J., et al.
Published: (2020)
The diagnosis of COVID-19 by means of transfer learning through X-ray images
by: Amiir Haamzah, Mohamed Ismail, et al.
Published: (2021)
by: Amiir Haamzah, Mohamed Ismail, et al.
Published: (2021)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
Method and system for steganography within handwritten signature images
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
A statistical comparison of digital X-ray images for MTB patients
by: Rijal, Omar Mohd., et al.
Published: (2005)
by: Rijal, Omar Mohd., et al.
Published: (2005)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
High Watermarking Image Quality Based on Dual Intermediate
Significant Bit (DISB)
by: Mohammed, G, et al.
Published: (2013)
by: Mohammed, G, et al.
Published: (2013)
Spiral bit-map signature for content-based images retrieval
by: Wang, Hui Hui
Published: (2003)
by: Wang, Hui Hui
Published: (2003)
The classification of Covid-19 cases through the employment of transfer learning on X-ray images
by: Nur Ameerah, Hakimi, et al.
Published: (2021)
by: Nur Ameerah, Hakimi, et al.
Published: (2021)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Available Transfer Capability and Least Square Method
by: Hojabri, Mojgan, et al.
Published: (2012)
by: Hojabri, Mojgan, et al.
Published: (2012)
Available transfer capability and least square method
by: Hojabri, Mojgan, et al.
Published: (2012)
by: Hojabri, Mojgan, et al.
Published: (2012)
A method to determine the density of foods using X-ray imaging
by: Kelkar, S., et al.
Published: (2015)
by: Kelkar, S., et al.
Published: (2015)
Development of least square adjustment application for traversing / Harith Fadhillah Soeb
by: Soeb, Harith Fadhillah
Published: (2019)
by: Soeb, Harith Fadhillah
Published: (2019)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Secret channel using video steganography
by: Lee, Kar Yee, et al.
Published: (2017)
by: Lee, Kar Yee, et al.
Published: (2017)
Similar Items
-
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019) -
Implementation of a logistic map to calculate the bits required for digital image steganography using the least significant bit (LSB) method
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023) -
Adaptive minimum error least significant bit replacement method for steganography using JPG/JPEG and PNG files
by: Wamiliana, Wamiliana, et al.
Published: (2015) -
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018) -
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
by: Edris, Khalid Edris, et al.
Published: (2014)