Cryptography, Steganography, & Digital Watermarking for Text Documentation
This paper is about three techniques used in securing text documents, cryptography, steganography, and digital watermarking. This review and comparison are made based on the available technologies and research in order to protect and secure all the documents including the patients’ personal informat...
| Main Authors: | Nurul Suzulyana, Zulkifley, Nur Haziqah, Zainal Abidin, Nurul Zulaikha, Sulaini, Muhamad Khairil Amir, Mohamad Nawi, Syifak Izhar, Hisham |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
Universiti Malaysia Pahang
2020
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/28815/ http://umpir.ump.edu.my/id/eprint/28815/1/3.%20Cryptography%2C%20Steganography%2C%20%26%20Digital%20Watermarking%20for%20Text%20Documentation.pdf http://umpir.ump.edu.my/id/eprint/28815/2/3.1%20Cryptography%2C%20Steganography%2C%20%26%20Digital%20Watermarking%20for%20Text%20Documentation.pdf |
Similar Items
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Scheme To Watermark Digital Text Documents
by: Tinauli, Musstanser
Published: (2007)
by: Tinauli, Musstanser
Published: (2007)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
A Quick Glance at Digital Watermarking in PACS
by: Syifak Izhar, Hisham, et al.
Published: (2012)
by: Syifak Izhar, Hisham, et al.
Published: (2012)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
Enhanced LSB watermarking methods based on scanning patterns for authentication of medical images
by: Syifak Izhar, Hisham
Published: (2016)
by: Syifak Izhar, Hisham
Published: (2016)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
An improved mapping pattern for Digital Watermarking using Hilbert-Peano Pattern
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
Offline Handwritten Signature Watermark for Digital Document Authentication
by: Low, Cheng Yaw
Published: (2008)
by: Low, Cheng Yaw
Published: (2008)
Offline Handwritten Signature Watermark For Digital Document Authentication
by: Yaw, Low Cheng
Published: (2008)
by: Yaw, Low Cheng
Published: (2008)
Digital Watermarking for Recovering Attack Areas of Medical Images using Spiral Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
A Quick Glance at Digital Watermarking in Medical Images Technique Classification, Requirements, Attacks and Application of Tamper Localization
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
State-of-the-art in techniques of text digital watermarking: challenges and limitations
by: Al-Maweri, Nasr Addin Ahmed Salem, et al.
Published: (2016)
by: Al-Maweri, Nasr Addin Ahmed Salem, et al.
Published: (2016)
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
Randomized text encryption: a new dimension in cryptography
by: Memon, Jamshed, et al.
Published: (2014)
by: Memon, Jamshed, et al.
Published: (2014)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Primitive structural method for high capacity text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2014)
by: Roslan, Nuur Alifah, et al.
Published: (2014)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
Steganography For Embedding Data In Digital Image
by: Sowan, Salah Ibrahem
Published: (2003)
by: Sowan, Salah Ibrahem
Published: (2003)
The evaluation performance of letter-based techniques on text steganography method
by: Ismail, Azizan, et al.
Published: (2018)
by: Ismail, Azizan, et al.
Published: (2018)
Traid-bit embedding process on Arabic text steganography method
by: Din, Roshidi, et al.
Published: (2021)
by: Din, Roshidi, et al.
Published: (2021)
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
Watermarking techniques for mobile application: A review
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022)
by: Roslan, Nuur Alifah, et al.
Published: (2022)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
Comparative analysis on raster, spiral, hilbert, and peano mapping pattern of fragile watermarking to address the authentication issue in healthcare system
by: Syifak Izhar, Hisham, et al.
Published: (2019)
by: Syifak Izhar, Hisham, et al.
Published: (2019)
Evaluation of spiral pattern watermarking scheme for common attacks to social media images
by: Tiew, Boon Li, et al.
Published: (2022)
by: Tiew, Boon Li, et al.
Published: (2022)
Data visualization for text-based documents
by: Yii, Kuo Chong
Published: (2023)
by: Yii, Kuo Chong
Published: (2023)
Digital watermarking : an overview
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
XML Digital Watermarking
by: Khalid, Edris, et al.
Published: (2013)
by: Khalid, Edris, et al.
Published: (2013)
Digital Watermarking For Images
by: Aileen Koay, Yee Hoon
Published: (2006)
by: Aileen Koay, Yee Hoon
Published: (2006)
Similar Items
-
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021) -
Scheme To Watermark Digital Text Documents
by: Tinauli, Musstanser
Published: (2007) -
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024) -
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024) -
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)