A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
The security level for documents is necessary since a lot of formal procedures and processes nowadays need digital documents as proof or process verification, such as internet banking receipts, official letters of appointment, academic transcripts and certificates, scanned documents, and commercial...
| Main Author: | Nur Alya Afikah, Usop |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2024
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/42481/ http://umpir.ump.edu.my/id/eprint/42481/1/ir.A%20framework%20of%20enhanced%20authentication%20for%20PDF%20textual%20documents.pdf |
Similar Items
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
HILBERT-LSB-C as Authentication System for Color Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2015)
by: Syifak Izhar, Hisham, et al.
Published: (2015)
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Prototype development for embedding large amount of information using secure LSB and neural based steganography
by: Saleh, Basam N.
Published: (2009)
by: Saleh, Basam N.
Published: (2009)
Enhanced LSB watermarking methods based on scanning patterns for authentication of medical images
by: Syifak Izhar, Hisham
Published: (2016)
by: Syifak Izhar, Hisham
Published: (2016)
Achieving security for images by LSB and MD5
by: Alahmad, Mohammad, et al.
Published: (2012)
by: Alahmad, Mohammad, et al.
Published: (2012)
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Mitigation of single-phase voltage sag and swell with zigzag transformer
by: Basu, K. P., et al.
Published: (2008)
by: Basu, K. P., et al.
Published: (2008)
AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014)
by: Ahmed, Zamzam Hohamed
Published: (2014)
Zigzag codes: high rate low complexity iterative codes
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Simulation : authentication system for tracking staff and document in security room / Haireeza Abdul Rashid
by: Abdul Rashid, Haireeza
Published: (2006)
by: Abdul Rashid, Haireeza
Published: (2006)
Feature Selection And Enhanced Krill Herd Algorithm For Text Document Clustering
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
Fusion of LSB and DWT biometric watermarking for offline handwritten signature
by: Cheng-Yaw, Low, et al.
Published: (2008)
by: Cheng-Yaw, Low, et al.
Published: (2008)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Comparison of document similarity algorithms in extracting document keywords from an academic paper
by: Miah, M. Saef Ullah, et al.
Published: (2021)
by: Miah, M. Saef Ullah, et al.
Published: (2021)
Protection of integrity and ownership of pdf documents using invisible signature
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Evaluation of spiral pattern watermarking scheme for common attacks to social media images
by: Tiew, Boon Li, et al.
Published: (2022)
by: Tiew, Boon Li, et al.
Published: (2022)
Ride through capabilities of load during voltage sag/swell and power interruption with zigzag transformer
by: Hafidz, S. A., et al.
Published: (2008)
by: Hafidz, S. A., et al.
Published: (2008)
DCT domain Stegasvm-shifted LSB model for highly
imperceptible and robust cover-image / Hanizan Shaker Hussain
by: Shaker Hussain, Hanizan
Published: (2014)
by: Shaker Hussain, Hanizan
Published: (2014)
Comparison of document similarity algorithms in extracting document keywords from an academic paper
by: Miah, M. Saef Ullah, et al.
Published: (2021)
by: Miah, M. Saef Ullah, et al.
Published: (2021)
Preliminary study on an ontology learning from textual data
by: Saad, Saidah, et al.
Published: (2006)
by: Saad, Saidah, et al.
Published: (2006)
The Qur'anic textual purity and authenticity: a diachronic analysis
by: Ushama, Thameem
Published: (2009)
by: Ushama, Thameem
Published: (2009)
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
Efficient Algorithms to Index, Store and Query XML Documents
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
LSB algorithm based on support vector machine in digital image steganography
by: Hussain, Hanizan Shaker, et al.
Published: (2017)
by: Hussain, Hanizan Shaker, et al.
Published: (2017)
On Managing Contextual Knowledge of Digital Document Ecosystems, characterized by Alphanumeric Textual Data
by: Nimmagadda, Shastri L, et al.
Published: (2019)
by: Nimmagadda, Shastri L, et al.
Published: (2019)
Watermarking techniques for mobile application: A review
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm
by: Mohd Hassan Wong , Fadhli Wong, et al.
Published: (2001)
by: Mohd Hassan Wong , Fadhli Wong, et al.
Published: (2001)
Framework to customize a Document Management System (DMS) using web services technology
by: Arshad, Noreen Izza, et al.
Published: (2008)
by: Arshad, Noreen Izza, et al.
Published: (2008)
Enhancement of a simple user authentication scheme for grid computing
by: Ramamoorthy, Viknesh
Published: (2008)
by: Ramamoorthy, Viknesh
Published: (2008)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
inding similarities of word matching in translated arabic and english documents using GHSOM algorithm
by: Ismail, Hanadi Hassen
Published: (2007)
by: Ismail, Hanadi Hassen
Published: (2007)
Crypto Embedded System for Electronic Document
by: Ahmad, Illiasaak, et al.
Published: (2006)
by: Ahmad, Illiasaak, et al.
Published: (2006)
Malay documents clustering algorithm based on singular value decomposition.
by: Ab Samat, Nordianah, et al.
Published: (2009)
by: Ab Samat, Nordianah, et al.
Published: (2009)
PSW statistical LSB image steganalysis
by: Shojae Chaeikar, Saman, et al.
Published: (2017)
by: Shojae Chaeikar, Saman, et al.
Published: (2017)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Similar Items
-
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
by: Usop, Nur Alya Afikah, et al.
Published: (2022) -
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021) -
HILBERT-LSB-C as Authentication System for Color Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2015) -
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021) -
Prototype development for embedding large amount of information using secure LSB and neural based steganography
by: Saleh, Basam N.
Published: (2009)