Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, and text. Text is an ideal...
| Main Author: | Thabit, Reema Ahmed Abdalla |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2022
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/104008/ http://psasir.upm.edu.my/id/eprint/104008/1/FSKTM%202022%205%20IR.pdf |
Similar Items
CSNTSteg: color spacing normalization text steganography model to improve capacity and invisibility of hidden data
by: Thabit, Reema, et al.
Published: (2022)
by: Thabit, Reema, et al.
Published: (2022)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)
by: Roslan, Nuur Alifah
Published: (2011)
Enhancing obfuscation technique for protecting source code against software reverse engineering
by: Mahfoudh, Asma
Published: (2019)
by: Mahfoudh, Asma
Published: (2019)
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
by: Badawi, Bakri
Published: (2022)
by: Badawi, Bakri
Published: (2022)
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)
by: Roslan, Nuur Alifah, et al.
Published: (2020)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
Low power text compression using Huffman coding with power management controller
by: Mohammed, Maan Hameed
Published: (2016)
by: Mohammed, Maan Hameed
Published: (2016)
Traid-bit embedding process on Arabic text steganography method
by: Din, Roshidi, et al.
Published: (2021)
by: Din, Roshidi, et al.
Published: (2021)
Estimating maturity of paddy using RGB colour space
by: Azman, Norsolehah, et al.
Published: (2014)
by: Azman, Norsolehah, et al.
Published: (2014)
An embedding traid-bit method to improve the performance of Arabic text steganography
by: Thabit, Reema Ahmed Abdalla
Published: (2016)
by: Thabit, Reema Ahmed Abdalla
Published: (2016)
Developing the ZigBee Based Data Payload Coding for Data Communication in Microgrids
by: Setiawan, M., et al.
Published: (2014)
by: Setiawan, M., et al.
Published: (2014)
The nonassociative algebras used to build fast-decodable space-time block codes
by: Pumpluen, Susanne, et al.
Published: (2015)
by: Pumpluen, Susanne, et al.
Published: (2015)
Hybrid QR code student attendance system using firebase and react / Muhammad Aiman Abd mutalib
by: Abd mutalib, Muhammad Aiman
Published: (2020)
by: Abd mutalib, Muhammad Aiman
Published: (2020)
Design Of Direct Sequence Code Division Multiple Access (Ds-Cdma) Wireless Transmitter Using Field Programmable Gate Array (Fpga)
by: Osman, Khalid Eltahir Mohamed
Published: (2002)
by: Osman, Khalid Eltahir Mohamed
Published: (2002)
Automated data process in participatory sensing using QR-code and EAN-13 barcode
by: Che Ya, Mohamad Fakhrul Syafiq
Published: (2018)
by: Che Ya, Mohamad Fakhrul Syafiq
Published: (2018)
How to obtain division algebras used for fast-decodable space-time block codes
by: Pumpluen, Susanne
Published: (2014)
by: Pumpluen, Susanne
Published: (2014)
Primitive structural method for high capacity text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2014)
by: Roslan, Nuur Alifah, et al.
Published: (2014)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Development of multi-service code family for spectral amplitude coding - optical code division multiple access systems
by: Kaka, Majid Hayas
Published: (2013)
by: Kaka, Majid Hayas
Published: (2013)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
How to obtain lattices from (f,σ,δ)-codes via a generalization of Construction A
by: Pumpluen, Susanne
Published: (2018)
by: Pumpluen, Susanne
Published: (2018)
^muzicode$: composing and performing musical codes
by: Greenhalgh, Chris, et al.
Published: (2016)
by: Greenhalgh, Chris, et al.
Published: (2016)
Developing smart assignment management system using Quick Response (QR) code / Wan Muhammad Khair Mohd Nasir
by: Mohd Nasir, Wan Muhammad Khair
Published: (2019)
by: Mohd Nasir, Wan Muhammad Khair
Published: (2019)
Code-switching amongst UiTM B. Ed. TESL students: awareness, frequency and situations / Adam Zulhilmi Ahmad
by: Ahmad, Adam Zulhilmi
Published: (2014)
by: Ahmad, Adam Zulhilmi
Published: (2014)
DFIG-based WECS Fault Ride through Complying with Australian Grid Codes
by: Khamaira, Mahmoud Yousef, et al.
Published: (2014)
by: Khamaira, Mahmoud Yousef, et al.
Published: (2014)
Efficient and secured compression and steganography technique in wireless sensor network
by: Tuama, Ammar Yaseen
Published: (2016)
by: Tuama, Ammar Yaseen
Published: (2016)
The gender code of school science
by: Parker, Lesley Hannah
Published: (1994)
by: Parker, Lesley Hannah
Published: (1994)
Public relations and code-switching: how technology shapes how we tell stories
by: Tombleson, Bridget, et al.
Published: (2019)
by: Tombleson, Bridget, et al.
Published: (2019)
Asynchrony adaptation reveals neural population code for audio-visual timing
by: Roach, Neil W., et al.
Published: (2011)
by: Roach, Neil W., et al.
Published: (2011)
Incoherent hybrid subcarrier multiplexed spectral-amplitude-coding optical CDMA system using direct decoding detection technique
by: Sahbudin, Ratna Kalos Zakiah, et al.
Published: (2007)
by: Sahbudin, Ratna Kalos Zakiah, et al.
Published: (2007)
Access control model based on trust, purpose, and role in materialized view for privacy protection
by: Salji, Mohd Rafiz
Published: (2019)
by: Salji, Mohd Rafiz
Published: (2019)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Ripeness level classification for pineapple using RGB and HSI colour maps
by: Abu Bakar, Badrul Hisham, et al.
Published: (2013)
by: Abu Bakar, Badrul Hisham, et al.
Published: (2013)
Combined coding and modulation in frequency-selective mobile communications.
by: Caldera, Manora K.
Published: (2000)
by: Caldera, Manora K.
Published: (2000)
Classification of Islamic social enterprises (ISE) in Malaysia based on economic sectors / Muhammad Iqmal Hisham Kamaruddin and Sofiah Md Auzair
by: Kamaruddin, Muhammad Iqmal Hisham, et al.
Published: (2018)
by: Kamaruddin, Muhammad Iqmal Hisham, et al.
Published: (2018)
Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Scene-selective coding by single neurons in the human parahippocampal cortex
by: Mormann, Florian, et al.
Published: (2017)
by: Mormann, Florian, et al.
Published: (2017)
Motion compensated video coding
by: Garnham, Nigel William
Published: (1995)
by: Garnham, Nigel William
Published: (1995)
Investigating the roles of long-non-coding RNA genes in zebrafish haematopoiesis
by: Alzaqqah, Fatemah
Published: (2020)
by: Alzaqqah, Fatemah
Published: (2020)
Fire Recognition Using RGB and YCBCR Color Space
by: Nor Anis Aneza, Lokman, et al.
Published: (2015)
by: Nor Anis Aneza, Lokman, et al.
Published: (2015)
Similar Items
-
CSNTSteg: color spacing normalization text steganography model to improve capacity and invisibility of hidden data
by: Thabit, Reema, et al.
Published: (2022) -
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011) -
Enhancing obfuscation technique for protecting source code against software reverse engineering
by: Mahfoudh, Asma
Published: (2019) -
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
by: Badawi, Bakri
Published: (2022) -
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)