Prototype development of VOIP steganography
Information Security has evolved significantly over the last decade and even more quickly over the last few years. Most organizations recognize that one of their most important assets is their data. Steganography is an effective means of hiding secret data, thereby protecting the data from unauthori...
| Main Author: | Al-Othmani, Abdulaleem Zaid Mohammed |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/11240/ http://eprints.utm.my/11240/6/AbdulaleemZaidMohammedMFSKSM2010.pdf |
Similar Items
Prototype development for embedding large amount of information using secure LSB and neural based steganography
by: Saleh, Basam N.
Published: (2009)
by: Saleh, Basam N.
Published: (2009)
VoIP in next generation converged networks
by: Toral-Cruz, Homero, et al.
Published: (2013)
by: Toral-Cruz, Homero, et al.
Published: (2013)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010)
by: Zamani, Mazdak
Published: (2010)
Steganography based on utilizing more surrounding pixels
by: Afrakhteh, Masoud
Published: (2010)
by: Afrakhteh, Masoud
Published: (2010)
Customer management solutions for voice over internet protocol (VOIP) services
by: Buyut, Veronica Clement
Published: (2008)
by: Buyut, Veronica Clement
Published: (2008)
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Performance analysis of voice codec for VoIP
by: Abd. Khuther, Ali
Published: (2008)
by: Abd. Khuther, Ali
Published: (2008)
An Improved Image Steganography Scheme Based on RDWT and QR Decomposition
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018)
by: Ng, Ke-Huey, et al.
Published: (2018)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
The effect of echo delay on voice quality in VoIP network
by: A.M., Said, et al.
Published: (2009)
by: A.M., Said, et al.
Published: (2009)
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov Models
by: Toral-Cruz, Homero, et al.
Published: (2012)
by: Toral-Cruz, Homero, et al.
Published: (2012)
Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
Development Bvag Replication Prototype In Distributed Database Environment
by: Muhammad Fathul Amin, Sulaiman
Published: (2023)
by: Muhammad Fathul Amin, Sulaiman
Published: (2023)
Internet call delay on peer to peer and phone to phone VoIP network
by: A.M., Said, et al.
Published: (2009)
by: A.M., Said, et al.
Published: (2009)
Enhanced performance of IPv6 packet transmission over VoIP network
by: A.M., Said, et al.
Published: (2009)
by: A.M., Said, et al.
Published: (2009)
Enhancing Security Protocol For Voip Communication Using Modified Vector Quantization
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
Performance of voice over IP (VoIP) over a wireless LAN (WLAN) for different audio/voice codecs
by: Mohd., Alias, et al.
Published: (2007)
by: Mohd., Alias, et al.
Published: (2007)
Packet based echo cancellation for VoIP networks
by: Abdul Rashid, Hairul Azhar
Published: (2007)
by: Abdul Rashid, Hairul Azhar
Published: (2007)
A new embedding technique based on psychovisual threshold for robust and secure compressed video steganography
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Komunikasi Suara Melalui Protokol Internet(VoIP) / Mohd. Azmi Mustafa @ Sulaiman
by: Mohd. Azmi, Mustafa @ Sulaiman
Published: (2004)
by: Mohd. Azmi, Mustafa @ Sulaiman
Published: (2004)
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
by: Mehdi , Hussain
Published: (2017)
by: Mehdi , Hussain
Published: (2017)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
Implementing throwaway prototyping model in web development life cycle (WDLC)
by: Abdullasim, Nazreen
Published: (2009)
by: Abdullasim, Nazreen
Published: (2009)
New consumer load prototype for electricity theft monitoring
by: Abdullateef, Adoyele Isqeel, et al.
Published: (2013)
by: Abdullateef, Adoyele Isqeel, et al.
Published: (2013)
An improved rdwt-based image steganography scheme using qr decomposition and human visual system
by: Ng, Ke Huey
Published: (2021)
by: Ng, Ke Huey
Published: (2021)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
A prototype of a mobile car rental system
by: Mon, Chit Su, et al.
Published: (2020)
by: Mon, Chit Su, et al.
Published: (2020)
A spatiotemporal database prototype for managing volumetric surface management data in virtual GIS
by: Rahim, Mohd. Shafri. Mohd., et al.
Published: (2007)
by: Rahim, Mohd. Shafri. Mohd., et al.
Published: (2007)
A systematic study of PESQ's behavior in simulated VoIP environment (from reference signal characteristics perspective)
by: Peter, Pocta, et al.
Published: (2008)
by: Peter, Pocta, et al.
Published: (2008)
Software Requirement Prioritization Prototype Using Analytical Hierarchical Process (AHP)
by: Rohani, Abu Bakar, et al.
Published: (2014)
by: Rohani, Abu Bakar, et al.
Published: (2014)
E-mail filter with attachment scanning prototype / Hema Losini Goval
by: Hema, Losini Goval
Published: (2001)
by: Hema, Losini Goval
Published: (2001)
Similar Items
-
Prototype development for embedding large amount of information using secure LSB and neural based steganography
by: Saleh, Basam N.
Published: (2009) -
VoIP in next generation converged networks
by: Toral-Cruz, Homero, et al.
Published: (2013) -
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014) -
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023) -
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010)