Stego Keys Performance on Feature Based Coding Method in Text Domain
A main critical factor on embedding process in any text steganography method is a key used known as stego key. This factor will be influenced the success of the embedding process of text steganography method to hide a message from third party or any adversary. One of the important aspects on emb...
| Main Authors: | Din, Roshidi, Samsudin, Azman, Utama, Sunariya |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
EDP Sciences
2017
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/37224/ http://eprints.usm.my/37224/1/%28Stego_Keys_Performance_on_Feature%29_shsconf_icome2017_00036.pdf |
Similar Items
Stego keys performance on feature based coding method in text domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
Feature Selection And Enhanced Krill Herd Algorithm For Text Document Clustering
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Critical analysis on steganography technique in text domain
by: Utama, Sunariya, et al.
Published: (2016)
by: Utama, Sunariya, et al.
Published: (2016)
Improving stego key using extended-1 and extended-2 techniques of feature coding method in text steganography
by: Utama, Sunariya
Published: (2024)
by: Utama, Sunariya
Published: (2024)
Bootstrapping Kelantan and Sarawak Malay dialect models on text and phonetic analyses in text-to-speech system
by: Khaw, Jasmina Yen Min
Published: (2017)
by: Khaw, Jasmina Yen Min
Published: (2017)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
Semantic Lexical Alignment For Domain-Specific Ontologies.
by: Abu-Shareha, Ahmad Adel, et al.
Published: (2009)
by: Abu-Shareha, Ahmad Adel, et al.
Published: (2009)
Identifying And Classifying Unknown Words In Malay Texts.
by: Bali, Ranaivo-Malançon, et al.
Published: (2007)
by: Bali, Ranaivo-Malançon, et al.
Published: (2007)
Domain name and site hosting preferences: empirical evidence
by: O’Daniel, Thomas, et al.
Published: (2000)
by: O’Daniel, Thomas, et al.
Published: (2000)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Robust Video Watermarking Based On 3D-DWT Domain.
by: A.M .Al-Taweel, Sadik., et al.
Published: (2009)
by: A.M .Al-Taweel, Sadik., et al.
Published: (2009)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
An Open-Domain Question Answering System Using Annotated Web Feeds.
by: Ismail, Bukhary Ikhwan, et al.
Published: (2007)
by: Ismail, Bukhary Ikhwan, et al.
Published: (2007)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Similarity-Based Weights For
Cross-Domain Sentiment Classification Of Product Reviews
by: Gupta, Aditi
Published: (2023)
by: Gupta, Aditi
Published: (2023)
A Pattern-Growth Sentence Compression Technique For Malay Text Summarizer
by: Alias, Suraya
Published: (2018)
by: Alias, Suraya
Published: (2018)
Improved Multi-Verse Optimizer In Text Document Clustering For Topic Extraction
by: Abasi, Ammar Kamal Mousa
Published: (2021)
by: Abasi, Ammar Kamal Mousa
Published: (2021)
CDS522 – Text and Speech Analytics (Analitik Teks dan Pertuturan)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CDS522 – Text and Speech Analytics
(Analitik Teks dan Pertuturan)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
A HYBRID GENETIC ALGORITHM FOR OPTICAL ORTHOGONAL CODE CONSTRUCTION
by: Ho, C. K., et al.
Published: (2003)
by: Ho, C. K., et al.
Published: (2003)
Automatic Text Alignment Using Recursive Hapax-Based Cut-Through Fragmentation
by: Ng , Pek Kuan
Published: (2012)
by: Ng , Pek Kuan
Published: (2012)
Analysis on spatial and temporal features of gait kinematics
by: Wan Noorshahida Mohd Isa,
Published: (2005)
by: Wan Noorshahida Mohd Isa,
Published: (2005)
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)
by: TEOH, A, et al.
Published: (2005)
Feature Estraction In Automatic Shape Recognition System.
by: Salam, Rosalina Abdul, et al.
Published: (2004)
by: Salam, Rosalina Abdul, et al.
Published: (2004)
Ontology-Based Source Code Retrieval Model To Support Program Comprehension
by: Kadar, Rozita
Published: (2019)
by: Kadar, Rozita
Published: (2019)
New code structure for spectral amplitude coding in OCDMA system
by: Hasoon, Feras N., et al.
Published: (2007)
by: Hasoon, Feras N., et al.
Published: (2007)
CDS522 – Text and Speech Analytics (Analitik Teks dan Pertuturan) - February 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Evaluation Review on Effectiveness and Security Performances of Text Steganography Technique
by: Din, Roshidi, et al.
Published: (2018)
by: Din, Roshidi, et al.
Published: (2018)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
Similar Items
-
Stego keys performance on feature based coding method in text domain
by: Din, Roshidi, et al.
Published: (2017) -
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012) -
Feature Selection And Enhanced Krill Herd Algorithm For Text Document Clustering
by: Abualigah, Laith Mohammad Qasim
Published: (2018) -
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007) -
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)