Image Steganography Using Hash Function And Compression
An image steganography is a method for concealing any data or secret messages within an image file. In this study, image steganography, which uses a secret key to improve hidden information security while enhancing the LSB approach, is introduced. Before being embedded into a cover image, the messag...
| Main Author: | Ahmad Sulaiman, Zurkifli |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/40715/ http://umpir.ump.edu.my/id/eprint/40715/1/CA20158.pdf |
Similar Items
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018)
by: Ng, Ke-Huey, et al.
Published: (2018)
Recovery And Tamper Localization For Reversible Iris Image Watermarking Scheme Using Hash Function
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Cryptographic hash function: A high level view
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
An Improved Image Steganography Scheme Based on RDWT and QR Decomposition
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
New constructions of universal hash functions based on function sums
by: Khoo, , K, et al.
Published: (2006)
by: Khoo, , K, et al.
Published: (2006)
A new embedding technique based on psychovisual threshold for robust and secure compressed video steganography
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
Prototype development of VOIP steganography
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Improved fuzzy hashing technique for biometric template protection
by: Ong, T. S., et al.
Published: (2014)
by: Ong, T. S., et al.
Published: (2014)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010)
by: Zamani, Mazdak
Published: (2010)
Steganography based on utilizing more surrounding pixels
by: Afrakhteh, Masoud
Published: (2010)
by: Afrakhteh, Masoud
Published: (2010)
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
An improved rdwt-based image steganography scheme using qr decomposition and human visual system
by: Ng, Ke Huey
Published: (2021)
by: Ng, Ke Huey
Published: (2021)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
by: Mehdi , Hussain
Published: (2017)
by: Mehdi , Hussain
Published: (2017)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization
by: Wai Kuan, Yip, et al.
Published: (2007)
by: Wai Kuan, Yip, et al.
Published: (2007)
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
Cancellable biometrics and annotations on BioHash
by: TEOH, A, et al.
Published: (2008)
by: TEOH, A, et al.
Published: (2008)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
Parallel Geometric Hashing Algorithm For Protein Tertiary Structure.
by: Jaber, Khalid, et al.
Published: (2007)
by: Jaber, Khalid, et al.
Published: (2007)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Run length encoding in image compression / Yusniza Yaakub
by: Yusniza, Yaakub
Published: (2004)
by: Yusniza, Yaakub
Published: (2004)
Measuring the performance of image data by using RLE algorithm in lossless compression technique
by: Nurmarsyita, Mohd Shah
Published: (2015)
by: Nurmarsyita, Mohd Shah
Published: (2015)
An Efficient Image Compression Technique using Tchebichef Bit Allocation
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
Similar Items
-
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018) -
Recovery And Tamper Localization For Reversible Iris Image Watermarking Scheme Using Hash Function
by: Muhammad Alif Aiman, Abd Samad
Published: (2023) -
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013) -
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014) -
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)