A secured data hiding using affine transformation in video steganography
Network security is the most essential aspect of information technology among today’s emerging digital technologies which demands secured communication of information. In this digital network, it is essential to secure the data from intruders and unauthorized receivers. Steganography plays a vital r...
| Main Authors: | Ramalingam, Mritha, Nor Ashidi, Mat Isa, Puviarasi, R. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2020
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/30040/ http://umpir.ump.edu.my/id/eprint/30040/1/A%20secured%20data%20hiding%20using%20affine%20transformation%20in%20video.pdf |
Similar Items
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023)
by: Ernawan, Ferda
Published: (2023)
Information hiding using steganography
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Secret channel using video steganography
by: Lee, Kar Yee, et al.
Published: (2017)
by: Lee, Kar Yee, et al.
Published: (2017)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
A new parking guidance system for outdoor environment
by: Puviarasi, R., et al.
Published: (2019)
by: Puviarasi, R., et al.
Published: (2019)
Challenges in multi-layer data security for video steganography
by: Samar Kamil,, et al.
Published: (2018)
by: Samar Kamil,, et al.
Published: (2018)
Video scene change detection based on histogram analysis for hiding message
by: M., Fuad, et al.
Published: (2021)
by: M., Fuad, et al.
Published: (2021)
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014)
by: Ahmed, Zamzam Hohamed
Published: (2014)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)
by: Roslan, Nuur Alifah
Published: (2011)
Steganography algorithm to hide secret message inside an image
by: Ibrahim, Rosziati, et al.
Published: (2011)
by: Ibrahim, Rosziati, et al.
Published: (2011)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Frame selection based on modified entropy and object motion for secured data hiding in videos
by: Muhammad Fuad, Abdullah
Published: (2021)
by: Muhammad Fuad, Abdullah
Published: (2021)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Research and design voice control camera using raspberry PI
by: Janani, V., et al.
Published: (2019)
by: Janani, V., et al.
Published: (2019)
An experimental research on GPS based boundary intruding boat monitoring system
by: Puviarasi, R., et al.
Published: (2019)
by: Puviarasi, R., et al.
Published: (2019)
A new data hiding technique based on irreducible polynomials
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Developing fish feeder system using Raspberry Pi
by: Hidayatul Nur, Hasim, et al.
Published: (2017)
by: Hidayatul Nur, Hasim, et al.
Published: (2017)
Self-monitoring framework for patients in IoT-based healthcare system
by: Ramalingam, Mritha, et al.
Published: (2019)
by: Ramalingam, Mritha, et al.
Published: (2019)
Automatic fracture detection in hand bone using MATLAB and image processing
by: Gowtham Naidu, D., et al.
Published: (2020)
by: Gowtham Naidu, D., et al.
Published: (2020)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Investigation and Evaluation of Embedded Controller Nodes of the Robotic Arm for Industrial Automation
by: Ramalingam, Mritha, et al.
Published: (2016)
by: Ramalingam, Mritha, et al.
Published: (2016)
Vehicle traffic differentiation and scheduling in sensor network using Ns2
by: Ramalingam, Mritha, et al.
Published: (2018)
by: Ramalingam, Mritha, et al.
Published: (2018)
Short Course by FK Reinforcement Learning on Video Game
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Designing IoT based posture monitoring system
by: Ramalingam, Mritha, et al.
Published: (2021)
by: Ramalingam, Mritha, et al.
Published: (2021)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Similar Items
-
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013) -
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019) -
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023) -
Information hiding using steganography
by: Mohamed Amin, Muhalim, et al.
Published: (2003) -
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)