Method and system for steganography within handwritten signature images
A method for encoding a text message within a handwritten signature includes the steps of pre-processing the handwritten signature for preparing the signature into a suitable format for extracting at least one attribute of the handwritten signature, extracting the at least one attribute of the handw...
| Main Authors: | Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Wan Adnan, Wan Azizun |
|---|---|
| Format: | Patent |
| Published: |
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/33620/ |
Similar Items
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Online handwritten signature recognition by length normalization using up-sampling and down-sampling
by: Malallah, Fahad Layth, et al.
Published: (2015)
by: Malallah, Fahad Layth, et al.
Published: (2015)
Online handwritten signature verification using neural network classifier based on principle component analysis
by: Iranmanesh, Vahab, et al.
Published: (2014)
by: Iranmanesh, Vahab, et al.
Published: (2014)
Automatic person identification system
using handwritten signatures
by: Abushariah, Ahmad A. M., et al.
Published: (2012)
by: Abushariah, Ahmad A. M., et al.
Published: (2012)
Wavelet analysis of resultant velocity belonging to genuine and forged signatures
by: Ahmad, Sharifah Mumtazah Syed, et al.
Published: (2016)
by: Ahmad, Sharifah Mumtazah Syed, et al.
Published: (2016)
Analysis of the effects and relationship of perceived handwritten signature's size, graphical complexity, and legibility with dynamic parameters for forged and genuine samples
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
Non-invertable online signature biometric template protection via shuffling and trigonometry transformation
by: Malallah, Fahad Layth, et al.
Published: (2014)
by: Malallah, Fahad Layth, et al.
Published: (2014)
Online signature verification using neural network and Pearson correlation features
by: Iranmanesh, Vahab, et al.
Published: (2013)
by: Iranmanesh, Vahab, et al.
Published: (2013)
Reissuable Biometrics Through Offline Handwritten Signature Verification
by: Ooi, Shih Yin
Published: (2008)
by: Ooi, Shih Yin
Published: (2008)
Offline Handwritten Signature Watermark for Digital Document Authentication
by: Low, Cheng Yaw
Published: (2008)
by: Low, Cheng Yaw
Published: (2008)
Offline Handwritten Signature Watermark For Digital Document Authentication
by: Yaw, Low Cheng
Published: (2008)
by: Yaw, Low Cheng
Published: (2008)
Image steganography
by: Jeniffer, Chegaram
Published: (2012)
by: Jeniffer, Chegaram
Published: (2012)
Personalized offline signature verification using multiple HMM-classifiers and SOM-fuzzy decision fusion
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
A preliminary study on biometric watermarking for offline handwritten signature
by: Low, C. Y., et al.
Published: (2007)
by: Low, C. Y., et al.
Published: (2007)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Dynamic Handwritten Signature Verification Based on Statistical Quantization Mechanism
by: Ong, Thian Song, et al.
Published: (2009)
by: Ong, Thian Song, et al.
Published: (2009)
Fusion of LSB and DWT biometric watermarking for offline handwritten signature
by: Cheng-Yaw, Low, et al.
Published: (2008)
by: Cheng-Yaw, Low, et al.
Published: (2008)
Development of offline handwritten signature authentication using artificial neural network
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
Support Vector Machines (SVM)-based biometric watermarking for offline handwritten signature
by: Cheng-Yaw, Low, et al.
Published: (2008)
by: Cheng-Yaw, Low, et al.
Published: (2008)
An improved image steganography algorithm based on PVD
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Steganography For Embedding Data In Digital Image
by: Sowan, Salah Ibrahem
Published: (2003)
by: Sowan, Salah Ibrahem
Published: (2003)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
A study on multipurpose watermarking techniques for image
by: Hasan Abbas, Nidaa, et al.
Published: (2017)
by: Hasan Abbas, Nidaa, et al.
Published: (2017)
On the use of edge features and exponential decaying number of nodes in the hidden layers for handwritten signature recognition
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
Soft biometrics: gender recognition from unconstrained face images using local feature descriptor
by: Arigbabu, Olasimbo Ayodeji, et al.
Published: (2015)
by: Arigbabu, Olasimbo Ayodeji, et al.
Published: (2015)
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
System and method for protecting digital documents and preventing unauthorized distribution of documents to third party
by: Wan Adnan, Wan Azizun, et al.
Published: (2013)
by: Wan Adnan, Wan Azizun, et al.
Published: (2013)
Steganography algorithm to hide secret message inside an image
by: Ibrahim, Rosziati, et al.
Published: (2011)
by: Ibrahim, Rosziati, et al.
Published: (2011)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
A method for Arabic handwritten diacritics characters
by: Abdullah, Muhamad Taufik, et al.
Published: (2019)
by: Abdullah, Muhamad Taufik, et al.
Published: (2019)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022)
by: Roslan, Nuur Alifah, et al.
Published: (2022)
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019)
by: Nur Shazana, Matri
Published: (2019)
Reconstruction of handwritten digit images using autoencoder neural networks
by: C. C., Tan, et al.
Published: (2008)
by: C. C., Tan, et al.
Published: (2008)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Similar Items
-
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018) -
Online handwritten signature recognition by length normalization using up-sampling and down-sampling
by: Malallah, Fahad Layth, et al.
Published: (2015) -
Online handwritten signature verification using neural network classifier based on principle component analysis
by: Iranmanesh, Vahab, et al.
Published: (2014) -
Automatic person identification system
using handwritten signatures
by: Abushariah, Ahmad A. M., et al.
Published: (2012) -
Wavelet analysis of resultant velocity belonging to genuine and forged signatures
by: Ahmad, Sharifah Mumtazah Syed, et al.
Published: (2016)