Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method
Computer security features for web applications are widely needed in many fields especially in defense industry. Detection phase is the most important aspect in the security development. Detection and investigation is commonly used to identify the suspected evidences from the computer crime. Stegano...
| Main Author: | Sivasangari, Krishnan |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/6976/ http://umpir.ump.edu.my/id/eprint/6976/1/CD7652.pdf |
Similar Items
Bloggers can hide or delete offending remarks, Election Court told
by: The Borneo, Post
Published: (2008)
by: The Borneo, Post
Published: (2008)
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014)
by: Ahmed, Zamzam Hohamed
Published: (2014)
Image data compression using DCT (Discrete Cosine Transform) and interpolation And allied topics in digital image processing applied to satellite imaging
by: Sathyanarayana, Pabbisetti, et al.
Published: (2007)
by: Sathyanarayana, Pabbisetti, et al.
Published: (2007)
System and method of transforming text into image for information hiding
by: Mahmod, Ramlan, et al.
Published: (2010)
by: Mahmod, Ramlan, et al.
Published: (2010)
A watermarking technique to improve the security level in face recognition systems: An experiment with Principal Component Analysis (PCA) for face recognition and Discrete Cosine Transform (DCT) for watermarking
by: Isa, Mohd Rizal Mohd Mohd, et al.
Published: (2017)
by: Isa, Mohd Rizal Mohd Mohd, et al.
Published: (2017)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
High resolution satellite image compression using zero padding discrete wavelet transform and discrete cosine transform algorithms
by: Al-Obaidi, Halah Saadoon Shihab
Published: (2016)
by: Al-Obaidi, Halah Saadoon Shihab
Published: (2016)
Single hand Indian classical gesture recognition based on discrete wavelet transform and discrete cosine transform feature extraction
by: Jaganathan, Kavitha
Published: (2015)
by: Jaganathan, Kavitha
Published: (2015)
VLSI Implementation Of 2-D Discrete Cosine Transform Algorithm For Image Compression
by: Islam, Md. Shabiul
Published: (2008)
by: Islam, Md. Shabiul
Published: (2008)
A new cooperative spectrum sensing scheme based on discrete cosine transform
by: Salman, Emad Hmood, et al.
Published: (2016)
by: Salman, Emad Hmood, et al.
Published: (2016)
Transforming Refugee Management in the Context of Sustainable International Development
by: Fauzan, Fauzan, et al.
Published: (2019)
by: Fauzan, Fauzan, et al.
Published: (2019)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Sambutan para penghuni terhadap proses pemulihan akhlak. Satu kajian ke atas Sekolah Tunas Bakti Sungai Lereh, Melaka / Zawiyah Mohd
by: Zawiyah, Mohd
Published: (1990)
by: Zawiyah, Mohd
Published: (1990)
Development and validation of guidance module for children in prison: A study at Kajang women’s prison, Malaysia
by: Dakir, Jawiah, et al.
Published: (2017)
by: Dakir, Jawiah, et al.
Published: (2017)
Domestic violence in the Tamale Metropolis, Ghana
by: Mohammed, Adam Andani, et al.
Published: (2017)
by: Mohammed, Adam Andani, et al.
Published: (2017)
Tackling suicidal tendencies
by: Abdul Razak, Dzulkifli
Published: (2019)
by: Abdul Razak, Dzulkifli
Published: (2019)
Persekitaran pembelajaran pelajar cacat penglihatan di Malaysia
by: Wong, Huey Siaw
Published: (2006)
by: Wong, Huey Siaw
Published: (2006)
Tahap Pengetahuan dan Penghayatan Agama Dalam Golongan Pekerja Seks (Sex Worker) di Kuala Lumpur
by: Khairul Hamimah,
Published: (2017)
by: Khairul Hamimah,
Published: (2017)
[Book Review] Punishment and Prisons: Power and the Carceral State, [by] Joe Sim. London: Sage, 2009.
by: Andrews, Paul Linus *
Published: (2012)
by: Andrews, Paul Linus *
Published: (2012)
Suicide is a national security threat
by: Ng, Alvin Lai Oon *
Published: (2022)
by: Ng, Alvin Lai Oon *
Published: (2022)
Providing better culture in elderly care
by: Chee, Kwan Foong*, et al.
Published: (2023)
by: Chee, Kwan Foong*, et al.
Published: (2023)
From Adventure to Therapy: A Model for Healing
by: Lee, Ken Kok Wai
Published: (2005)
by: Lee, Ken Kok Wai
Published: (2005)
[Kertas-kertas kerja Seminar mengenai Jenayah di Malaysia yang berlangsung pada 20 Ogos 1988 di Universiti Malaya, Kuala Lumpur]
by: Universiti Malaya, Jabatan Antropologi dan Sosiologi
Published: (1988)
by: Universiti Malaya, Jabatan Antropologi dan Sosiologi
Published: (1988)
Kemiskinan di kalangan kaum Rungus di daerah Kudat, Sabah / Paul Porodong
by: Porodong, Paul
Published: (1997)
by: Porodong, Paul
Published: (1997)
Health care and socio-economic support of the elderly in Peninsular Malaysia / Tey Hwei Choo.
by: Tey, Hwei Choo
Published: (1995)
by: Tey, Hwei Choo
Published: (1995)
Kajian keberkesanan dasar anti dadah Malaysia / oleh Ismail bin Haji Ahmad.
by: Haji Ahmad, Ismail
Published: (2001)
by: Haji Ahmad, Ismail
Published: (2001)
Keluarga banduan : gerakbalas dan penyesuaian terhadap ketiadaan suami / Zuriah bt Hj Abu Bakar.
by: Abu Bakar, Zuriah
Published: (1996)
by: Abu Bakar, Zuriah
Published: (1996)
A study of child abuse in Kuala Lumpur : cases reported to the Social Welfare Department during 1995 / by Sonali Singh
by: Singh, Sonali
Published: (1998)
by: Singh, Sonali
Published: (1998)
Rethinking police education : a comparative analysis using the hermeneutical approach / Narayanan a/l Srinivasan
by: Srinivasan, Narayanan
Published: (2001)
by: Srinivasan, Narayanan
Published: (2001)
Kegiatan sosio-ekonomi penghijrahan Indonesia di Kampung Kerinchi / Junipah bt Wandi.
by: Junipah, Wandi
Published: (1991)
by: Junipah, Wandi
Published: (1991)
Belia tidak berpersatuan: laporan kajian
by: Syed Abdullah Idid, Syed Arabi, et al.
Published: (2007)
by: Syed Abdullah Idid, Syed Arabi, et al.
Published: (2007)
Tendency of corruption and its determinants among public servants: a case study of Malaysia
by: Duasa, Jarita
Published: (2010)
by: Duasa, Jarita
Published: (2010)
Urban poverty: a case study of major cities in Malaysia
by: Pramanik, Ataul Huq, et al.
Published: (2009)
by: Pramanik, Ataul Huq, et al.
Published: (2009)
Sustainable development in Malaysia: a case study on household Waste Management
by: Jalil, Md. Abdul
Published: (2010)
by: Jalil, Md. Abdul
Published: (2010)
Institusi ilmu pengetahuan bukan markas politik
by: Abd Rahman, Saodah
Published: (2001)
by: Abd Rahman, Saodah
Published: (2001)
Mendalami Islam elak radikalisme
by: Abd Rahman, Saodah
Published: (2008)
by: Abd Rahman, Saodah
Published: (2008)
Smoking: ban all forms of tobacco
by: Nik Mohamed, Mohamad Haniki
Published: (2011)
by: Nik Mohamed, Mohamad Haniki
Published: (2011)
UMP Alumni Association distributes hand sanitisers to frontliners
by: Mohd Ferdaus, Musa
Published: (2020)
by: Mohd Ferdaus, Musa
Published: (2020)
Jasa siswa UMP kepada warga emas
by: Siti Norizat, Shikh Abdul Jalil
Published: (2013)
by: Siti Norizat, Shikh Abdul Jalil
Published: (2013)
Mahasiswa UMP jayakan program kemasyarakatan di Tioman
by: UMP, .
Published: (2014)
by: UMP, .
Published: (2014)
Similar Items
-
Bloggers can hide or delete offending remarks, Election Court told
by: The Borneo, Post
Published: (2008) -
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014) -
Image data compression using DCT (Discrete Cosine Transform) and interpolation And allied topics in digital image processing applied to satellite imaging
by: Sathyanarayana, Pabbisetti, et al.
Published: (2007) -
System and method of transforming text into image for information hiding
by: Mahmod, Ramlan, et al.
Published: (2010) -
A watermarking technique to improve the security level in face recognition systems: An experiment with Principal Component Analysis (PCA) for face recognition and Discrete Cosine Transform (DCT) for watermarking
by: Isa, Mohd Rizal Mohd Mohd, et al.
Published: (2017)