Skip to content
VuFind
Advanced
  • Cryptography, Steganography, &...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
Cryptography, Steganography, & Digital Watermarking for Text Documentation
QR Code

Cryptography, Steganography, & Digital Watermarking for Text Documentation

This paper is about three techniques used in securing text documents, cryptography, steganography, and digital watermarking. This review and comparison are made based on the available technologies and research in order to protect and secure all the documents including the patients’ personal informat...

Full description

Bibliographic Details
Main Authors: Nurul Suzulyana, Zulkifley, Nur Haziqah, Zainal Abidin, Nurul Zulaikha, Sulaini, Muhamad Khairil Amir, Mohamad Nawi, Syifak Izhar, Hisham
Format: Conference or Workshop Item
Language:English
English
Published: Universiti Malaysia Pahang 2020
Subjects:
QA76 Computer software
Online Access:http://umpir.ump.edu.my/id/eprint/28815/
http://umpir.ump.edu.my/id/eprint/28815/1/3.%20Cryptography%2C%20Steganography%2C%20%26%20Digital%20Watermarking%20for%20Text%20Documentation.pdf
http://umpir.ump.edu.my/id/eprint/28815/2/3.1%20Cryptography%2C%20Steganography%2C%20%26%20Digital%20Watermarking%20for%20Text%20Documentation.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://umpir.ump.edu.my/id/eprint/28815/
http://umpir.ump.edu.my/id/eprint/28815/1/3.%20Cryptography%2C%20Steganography%2C%20%26%20Digital%20Watermarking%20for%20Text%20Documentation.pdf
http://umpir.ump.edu.my/id/eprint/28815/2/3.1%20Cryptography%2C%20Steganography%2C%20%26%20Digital%20Watermarking%20for%20Text%20Documentation.pdf

Similar Items

  • A review of digital watermarking techniques, characteristics and attacks in text documents
    by: Usop, Nur Alya Afikah, et al.
    Published: (2021)
  • Scheme To Watermark Digital Text Documents
    by: Tinauli, Musstanser
    Published: (2007)
  • Efficient text data hiding technique using cryptography and steganography
    by: Mohd Sani, Nor Fazlida, et al.
    Published: (2024)
  • Efficient text data hiding technique using cryptography and steganography
    by: Mohd Sani, Nor Fazlida, et al.
    Published: (2024)
  • Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
    by: 'Aqilah, Abd. Ghani, et al.
    Published: (2021)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips