Frame selection based on modified entropy and object motion for secured data hiding in videos
The growth of internet technology makes hiding information techniques become popular communication. Video has been widely used as media for concealing communication existence by hiding messages. Videos are often compressed to reduce storage and transmission payload at the expense of lower quality du...
| Main Author: | Muhammad Fuad, Abdullah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/37652/ http://umpir.ump.edu.my/id/eprint/37652/1/ir.Frame%20selection%20based%20on%20modified%20entropy%20and%20object%20motion%20for%20secured%20data%20hiding%20in%20videos.pdf |
Similar Items
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023)
by: Ernawan, Ferda
Published: (2023)
A secured data hiding using affine transformation in video steganography
by: Ramalingam, Mritha, et al.
Published: (2020)
by: Ramalingam, Mritha, et al.
Published: (2020)
Digital watermarking and data hiding techniques
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
Data hiding within color images based on MCT with x-or operations
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
A new data hiding technique based on irreducible polynomials
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
A Novel Reversible Data Hiding Technique with
High Capacity and Less Overhead Information
by: M. Almangush, Hamida, et al.
Published: (2012)
by: M. Almangush, Hamida, et al.
Published: (2012)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Reversible data hiding scheme based on 3-Least significant bits and mix column transform
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Information hiding in multimedia files : a literature review
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
A new embedding technique based on psychovisual threshold for robust and secure compressed video steganography
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
Video scene change detection based on histogram analysis for hiding message
by: M., Fuad, et al.
Published: (2021)
by: M., Fuad, et al.
Published: (2021)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
Statistical Analysis of Video Frame Size Distribution
Originating from Scalable Video Codec (SVC)
by: Ahmadpour, Sima, et al.
Published: (2017)
by: Ahmadpour, Sima, et al.
Published: (2017)
Passive video forgery detection using frame correlation statistical features / Aminu Mustapha Bagiwa
by: Aminu Mustapha, Bagiwa
Published: (2017)
by: Aminu Mustapha, Bagiwa
Published: (2017)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Permutation entropy based full-reference image
quality qssessment
by: Baqar, Mohtashim *, et al.
Published: (2019)
by: Baqar, Mohtashim *, et al.
Published: (2019)
Textured Renyl Entropy for Image Thresholding
by: Abu Shareha, Ahmad Adel, et al.
Published: (2008)
by: Abu Shareha, Ahmad Adel, et al.
Published: (2008)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Implementing the reliability of data information in multi-criteria decision making process based on fuzzy topsis and fuzzy entropy
by: N. J., Mohd Jamal, et al.
Published: (2021)
by: N. J., Mohd Jamal, et al.
Published: (2021)
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
Security based Risk Management based on Multi-Objectives Model using QPSO
by: Noraziah, Ahmad, et al.
Published: (2014)
by: Noraziah, Ahmad, et al.
Published: (2014)
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014)
by: Ahmed, Zamzam Hohamed
Published: (2014)
Video authentication in HEVC compressed domain / Tew Yiqi
by: Tew, Yiqi
Published: (2016)
by: Tew, Yiqi
Published: (2016)
Object-relational Features for Modeling and Analysis of Spatio-temporal Data
by: Kamruzzaman, A. Z. M, et al.
Published: (2006)
by: Kamruzzaman, A. Z. M, et al.
Published: (2006)
A Hybrid ACO-Graph Entropy for Functional Modules Detection From Protein-Protein Interaction Network
by: Jamaludin, Sallim, et al.
Published: (2018)
by: Jamaludin, Sallim, et al.
Published: (2018)
A new search and extraction technique for motion capture data
by: Mohamad, Rafidei
Published: (2008)
by: Mohamad, Rafidei
Published: (2008)
Transient entropy squeezing of a single-Cooper-pair box placed inside a phase-damped cavity
by: Abdel-Shafi F., Obada, et al.
Published: (2008)
by: Abdel-Shafi F., Obada, et al.
Published: (2008)
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Data delivery optimization by efficient cluster head selection of wireless sensor network
by: A., Khan, et al.
Published: (2009)
by: A., Khan, et al.
Published: (2009)
Object occlusion and object removal detection
by: Chai, Yung Joon
Published: (2015)
by: Chai, Yung Joon
Published: (2015)
Data embedding using predictive syntax elements in scalable coded video / Pang Lie Lin
by: Pang , Lie Lin
Published: (2021)
by: Pang , Lie Lin
Published: (2021)
Spatio-Temporal Biodiversity Data Model Using Object Relational Modeling Approach
by: Wahid, Mohd. Taib, et al.
Published: (2005)
by: Wahid, Mohd. Taib, et al.
Published: (2005)
Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002)
by: Islam, Md. Rafiqul, et al.
Published: (2002)
Perceptual model-based information hiding in audio signals
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Similar Items
-
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019) -
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020) -
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023) -
A secured data hiding using affine transformation in video steganography
by: Ramalingam, Mritha, et al.
Published: (2020) -
Digital watermarking and data hiding techniques
by: Zeki. Khedher, Akram M., et al.
Published: (2006)