Information hiding in multimedia files : a literature review
There are two basic idea to keep something as a secret, the object could be changed by rules to a form could not be recognized the original object just for people who know these rules and every thing about it such that thy can obtain the original object, his is called "Cryptography" which...
| Main Authors: | Ali Ja’far, Abdullah Mohammed Abdo, Deris, Safaai |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3476/ http://eprints.utm.my/3476/1/SafaaiDeris2006_InformationHidinginMultimediaFiles.pdf |
Similar Items
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Digital watermarking and data hiding techniques
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
A Novel Reversible Data Hiding Technique with
High Capacity and Less Overhead Information
by: M. Almangush, Hamida, et al.
Published: (2012)
by: M. Almangush, Hamida, et al.
Published: (2012)
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023)
by: Ernawan, Ferda
Published: (2023)
A new data hiding technique based on irreducible polynomials
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Data hiding within color images based on MCT with x-or operations
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Sending the output to a print file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
The impact of file sharing based on the peer-to-peer technology
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
Protecting an Internet Web File using Java
by: Taha, Imad, et al.
Published: (2004)
by: Taha, Imad, et al.
Published: (2004)
Reversible data hiding scheme based on 3-Least significant bits and mix column transform
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Selecting informative genes from leukemia gene expression data using a hybrid approach for cancer classification
by: Mohamad, Mohd. Saberi, et al.
Published: (2007)
by: Mohamad, Mohd. Saberi, et al.
Published: (2007)
Frame selection based on modified entropy and object motion for secured data hiding in videos
by: Muhammad Fuad, Abdullah
Published: (2021)
by: Muhammad Fuad, Abdullah
Published: (2021)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Dynamics of watermark position in audio watermarked
files using neural networks
by: Abubakar, Adamu, et al.
Published: (2017)
by: Abubakar, Adamu, et al.
Published: (2017)
Towards implementing reactive scheduling for job shop problem
by: Zakaria, Zalmiyah, et al.
Published: (2006)
by: Zakaria, Zalmiyah, et al.
Published: (2006)
Towards gene network estimation with structure learning
by: Zainudin, Suhaila, et al.
Published: (2006)
by: Zainudin, Suhaila, et al.
Published: (2006)
Operation sequencing using modified particle swarm optimization
by: Zakaria, Zalmiyah, et al.
Published: (2007)
by: Zakaria, Zalmiyah, et al.
Published: (2007)
An adaptive wrapper algorithm for file transfer applications to support optimal large file transfers
by: Ghobadi, Alireza, et al.
Published: (2009)
by: Ghobadi, Alireza, et al.
Published: (2009)
Green information technology system practice for sustainable collaborative enterprise: A structural literature review
by: Anthony Jr, Bokolo, et al.
Published: (2017)
by: Anthony Jr, Bokolo, et al.
Published: (2017)
CMT422 – MULTIMEDIA INFORMATION SYSTEMS & MANAGEMENT [SISTEM & PENGURUSAN MAKLUMAT MULTIMEDIA] JUN 2017
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
CMT422 – MULTIMEDIA INFORMATION SYSTEMS & MANAGEMENT [SISTEM & PENGURUSAN MAKLUMAT MULTIMEDIA] JUN 2016
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
CMT422 – MULTIMEDIA INFORMATION SYSTEMS & MANAGEMENT
[SISTEM & PENGURUSAN MAKLUMAT MULTIMEDIA] JUN. 2015
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
Factors Contributing Towards Slow Adoption of Information Technology (IT): A Literature Review
by: Nik Fatma Arisya, Nik Yahya, et al.
Published: (2019)
by: Nik Fatma Arisya, Nik Yahya, et al.
Published: (2019)
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014)
by: Ahmed, Zamzam Hohamed
Published: (2014)
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019)
by: Zahedeh, Zamanian
Published: (2019)
Visualization of automated plate cutting operation using DXF file
by: Abd. Rahim, Norazura
Published: (2008)
by: Abd. Rahim, Norazura
Published: (2008)
Structures (struct) and files
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
Engineering JADEX agents with the MaSE methodology
by: Mohamad, Radziah, et al.
Published: (2006)
by: Mohamad, Radziah, et al.
Published: (2006)
Predicting protein-protein interactions as a one-class classification problem
by: Alashwal, Hany, et al.
Published: (2006)
by: Alashwal, Hany, et al.
Published: (2006)
A finite-state approach to arabic broken noun morphology
by: Alajmi, Naser, et al.
Published: (2006)
by: Alajmi, Naser, et al.
Published: (2006)
UTMGO : a tool for searching a group of semantically related gene ontology terms and application to annotation of anonymous protein sequence
by: Deris, Safaai, et al.
Published: (2006)
by: Deris, Safaai, et al.
Published: (2006)
MaSE2Jadex : a roadmap to engineer JADEX agents from mase methodology
by: Mohamed, Radziah, et al.
Published: (2006)
by: Mohamed, Radziah, et al.
Published: (2006)
One-class support vector machines for protein-protein interactions prediction
by: Alashwal, H., et al.
Published: (2006)
by: Alashwal, H., et al.
Published: (2006)
Pattern-oriented design for multi-agent system: a conceptual model
by: Mohamad, Radziah, et al.
Published: (2007)
by: Mohamad, Radziah, et al.
Published: (2007)
A hybrid bio-inspired and musical-harmony approach for machine loading optimization in flexible manufacturing system
by: Yusof, Umi Kalsom, et al.
Published: (2014)
by: Yusof, Umi Kalsom, et al.
Published: (2014)
CMT316 - HYPERMEDIA & MULTIMEDIA INFORMATION SYSTEMS APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CMT316 - HYPERMEDIA & MULTIMEDIA INFORMATION SYSTEMS APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
Similar Items
-
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013) -
Digital watermarking and data hiding techniques
by: Zeki. Khedher, Akram M., et al.
Published: (2006) -
A Novel Reversible Data Hiding Technique with
High Capacity and Less Overhead Information
by: M. Almangush, Hamida, et al.
Published: (2012) -
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023) -
A new data hiding technique based on irreducible polynomials
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)