Steganography For Embedding Data In Digital Image
The growth of the World Wide Web (WWW) has enabled the personal computer to be used as a general communications tool. As in the case of other forms of communication there is a wish for security and privacy. With literally millions of images moving on the Internet each year, it is safe to say that...
| Main Author: | Sowan, Salah Ibrahem |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/12166/ http://psasir.upm.edu.my/id/eprint/12166/1/FK_2003_25.pdf |
Similar Items
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
Paper-based disposable electrowetting chip for microfluidic application
by: Ismail, Noor Faezah
Published: (2018)
by: Ismail, Noor Faezah
Published: (2018)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)
by: Mohd Ali, Fakariah Hani
Published: (2004)
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
Design and development of an automated mechanical valve for variable rate knapsack sprayer
by: Shamsi, Siti Mariam
Published: (2017)
by: Shamsi, Siti Mariam
Published: (2017)
Development and verification of predictive maintenance system in a solar cell manufacturing industry
by: Shahrir, Nurhaiza
Published: (2013)
by: Shahrir, Nurhaiza
Published: (2013)
Design, manufacturing and testing of parachute recovery system for aludra SR-10 unmanned aerial vehicle (UAV)
by: Saim, Raudhah
Published: (2019)
by: Saim, Raudhah
Published: (2019)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
Factorization strategies of N = pq and N = pʳq and relation to its decryption exponent bound
by: Abubakar, Saidu Isah
Published: (2018)
by: Abubakar, Saidu Isah
Published: (2018)
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
Annihilators through fault injection analysis on selected stream ciphers
by: Omar @ Othman, Wan Zariman
Published: (2019)
by: Omar @ Othman, Wan Zariman
Published: (2019)
Monitoring of agricultural land abandonment using remote sensing technology
by: Mohamad Yusoff, Noryusdiana
Published: (2016)
by: Mohamad Yusoff, Noryusdiana
Published: (2016)
Developing prosthetic artificial muscle actuator using dielectric elastomers
by: El-Hamad, Haneen Jawad Mahmoud
Published: (2016)
by: El-Hamad, Haneen Jawad Mahmoud
Published: (2016)
Computational study of an air ventilation system based on CFD simulation in hospital operation theatre environment
by: Faraj, Muneerah ABS
Published: (2019)
by: Faraj, Muneerah ABS
Published: (2019)
Synthesis and characterization of transparent superhydrophobic fluorinated graphene oxide and silica based sol gel coating films
by: Harun, Mohd Hamzah
Published: (2020)
by: Harun, Mohd Hamzah
Published: (2020)
Musical Cryptography: Codes, Ciphers, Form, and Function
by: Thompson, Benjamin
Published: (2024)
by: Thompson, Benjamin
Published: (2024)
Some statistical simulation results over the 128-bit block cipher CLEFIA
by: Rezaeipour, Davood, et al.
Published: (2009)
by: Rezaeipour, Davood, et al.
Published: (2009)
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)
by: Mohamed, Mohamad Afendee
Published: (2011)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
by: Bafandehkar, Mohsen
Published: (2015)
by: Bafandehkar, Mohsen
Published: (2015)
A RSA-type cryptosystem based on quartic polynomials
by: Wong, Tze Jin
Published: (2011)
by: Wong, Tze Jin
Published: (2011)
Design and characterisation of a label free evanescent waveguide microscope
by: Choi, Rebecca
Published: (2015)
by: Choi, Rebecca
Published: (2015)
In-service estimation of state of health of power modules
by: Eleffendi, Mohd Amir
Published: (2016)
by: Eleffendi, Mohd Amir
Published: (2016)
Operational characteristics and determination of resistance
for effective powering and propulsion of fishing boats
of lower Perak River of Malaysia
by: Molla, Md. Abul Hossain, et al.
Published: (2002)
by: Molla, Md. Abul Hossain, et al.
Published: (2002)
A Comparison of the Effectiveness of Four Exercise Machines in the Development of Health Related Fitness among Women in Universiti Putra Malaysia
by: Kok, Lian Yee
Published: (1998)
by: Kok, Lian Yee
Published: (1998)
Resource allocation techniques for interference mitigation in macro and femtocell heterogeneous network-based LTE system
by: Al-omari, Motea Saleh Mohammed
Published: (2017)
by: Al-omari, Motea Saleh Mohammed
Published: (2017)
Design and development of a seeding machine for system of rice intensification seedling tray
by: Abdulkadir, Tukur Daiyabu
Published: (2019)
by: Abdulkadir, Tukur Daiyabu
Published: (2019)
Modified Data Encryption Standard Algorithm for Textbased Applications
by: Mohamed Khmag, Asem Ib.
Published: (2006)
by: Mohamed Khmag, Asem Ib.
Published: (2006)
Similar Items
-
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018) -
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016) -
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006) -
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015) -
Paper-based disposable electrowetting chip for microfluidic application
by: Ismail, Noor Faezah
Published: (2018)