Steganography based on utilizing more surrounding pixels
The purpose of this study is to investigate the application of least significant bit insertion method (LSB) in concealing a definite amount of message bits inside a typical media such as an 8-bit gray-scale image and develop an alternative model structure selection algorithm based on considering mor...
| Main Author: | Afrakhteh, Masoud |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/11093/ http://eprints.utm.my/11093/6/MasoudAfrakhtehMFSKSM2010.pdf |
Similar Items
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010)
by: Zamani, Mazdak
Published: (2010)
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
Prototype development of VOIP steganography
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
An Improved Image Steganography Scheme Based on RDWT and QR Decomposition
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Image contrast enhancement based on the intensity of regions’ pixels / Mahmood Salah Haithami
by: Mahmood Salah , Haithami
Published: (2018)
by: Mahmood Salah , Haithami
Published: (2018)
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
Image watermarking based on integer wavelet transform-singular value decomposition with variance pixels
by: Ernawan, F., et al.
Published: (2019)
by: Ernawan, F., et al.
Published: (2019)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Adaptive circular enclosure colour distribution geometrical model utilizing point-in-polygon for segregation between lips and skin pixels
by: Lee, Hao Wei, et al.
Published: (2012)
by: Lee, Hao Wei, et al.
Published: (2012)
An offline signature verification technique using pixels intensity levels
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
by: Hosseiny Fatemi, Mohammad Reza
Published: (2012)
by: Hosseiny Fatemi, Mohammad Reza
Published: (2012)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018)
by: Ng, Ke-Huey, et al.
Published: (2018)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
A new embedding technique based on psychovisual threshold for robust and secure compressed video steganography
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Pixel-Based Parallel-Coordinates Technique For Outlier Detection In Cardiac Patient Dataset.
by: Hasimah, H.M., et al.
Published: (2007)
by: Hasimah, H.M., et al.
Published: (2007)
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
by: Mehdi , Hussain
Published: (2017)
by: Mehdi , Hussain
Published: (2017)
An improved rdwt-based image steganography scheme using qr decomposition and human visual system
by: Ng, Ke Huey
Published: (2021)
by: Ng, Ke Huey
Published: (2021)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Prototype development for embedding large amount of information using secure LSB and neural based steganography
by: Saleh, Basam N.
Published: (2009)
by: Saleh, Basam N.
Published: (2009)
NFC based attendance: more than just a touch
by: Zuhedy Zay, Aqqiela Zuhra, et al.
Published: (2015)
by: Zuhedy Zay, Aqqiela Zuhra, et al.
Published: (2015)
Integrating Pixel-Based Algorithms for Area Measurement in Brain Tumor Classification
by: Dwi Swasono, Rachmad
Published: (2025)
by: Dwi Swasono, Rachmad
Published: (2025)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
“Less Give More”: Evaluate and zoning Android applications
by: Mohd Faizal, Ab Razak, et al.
Published: (2019)
by: Mohd Faizal, Ab Razak, et al.
Published: (2019)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023)
by: Ernawan, Ferda
Published: (2023)
An analysis of alphabet-based techniques in text steganography
by: Osman, Baharudin, et al.
Published: (2016)
by: Osman, Baharudin, et al.
Published: (2016)
Enhanced slicing-based anonymization approach for privacy-preserving data publishing with improved data utility
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
Utilization of artificial immune system in prediction of paddy production
by: Mohd Khidzir, Ainul Bahiah, et al.
Published: (2014)
by: Mohd Khidzir, Ainul Bahiah, et al.
Published: (2014)
Utilization of artificial immune system in prediction of paddy production
by: Mohd Khidzir, Ainul Bahiah, et al.
Published: (2015)
by: Mohd Khidzir, Ainul Bahiah, et al.
Published: (2015)
Utilizing hippocratic database for personal information privacy protection
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
Utilizing Electronic Institution For Protocol Specification In Agent-Based E-Learning System
by: Latif, N.A., et al.
Published: (2009)
by: Latif, N.A., et al.
Published: (2009)
Speech-based English sight word reading model for autistic children / Ahmad Masoud Raufi
by: Ahmad Masoud , Raufi
Published: (2019)
by: Ahmad Masoud , Raufi
Published: (2019)
Conceptualization of the Antecedents and Impacts of KMS Utilization: A preliminary framework.
by: Ishaq, Oyefolahan, et al.
Published: (2010)
by: Ishaq, Oyefolahan, et al.
Published: (2010)
Critical analysis on steganography technique in text domain
by: Utama, Sunariya, et al.
Published: (2016)
by: Utama, Sunariya, et al.
Published: (2016)
Similar Items
-
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010) -
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009) -
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020) -
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014) -
Prototype development of VOIP steganography
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)