Information hiding using steganography
The Internet as a whole does not use secure links, thus information in transit may be vulnerable to interception as well. The important of reducing a chance of the information being detected during the transmission is being an issue now days. Some solution to be discussed is how to passing informati...
| Main Authors: | Mohamed Amin, Muhalim, Ibrahim, Subariah, Salleh, Mazleena, Katmin, Mohd. Rozi |
|---|---|
| Format: | Monograph |
| Language: | English |
| Published: |
Faculty of Computer Science and Information System
2003
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/4339/ http://eprints.utm.my/4339/1/71847.pdf |
Similar Items
Provider independent cryptographic tools
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Health Information Security Guidelines for Healthcare Information Systems
by: Narayanan Samy , Ganthan, et al.
Published: (2011)
by: Narayanan Samy , Ganthan, et al.
Published: (2011)
Trends in information retrieval system
by: Othman, Roslina
Published: (2009)
by: Othman, Roslina
Published: (2009)
Interface characteristics, perceived ease of use, perceived usefulness and intention to use UUM e-library
by: Nik Mohd Baidzani Haddad, Ibrahim
Published: (2017)
by: Nik Mohd Baidzani Haddad, Ibrahim
Published: (2017)
An Integrated Approach in Risk Management Process for Identifying Information Security Threats using Medical Research Design
by: Ahmad, Rabiah
Published: (2012)
by: Ahmad, Rabiah
Published: (2012)
Spatial and non-spatial databases enhancement for hydrological information system (HIS)
by: Daman, Daut, et al.
Published: (2002)
by: Daman, Daut, et al.
Published: (2002)
A study on information extraction from heterogeneous, distributed and autonomous dna databases using ontology-based agent
by: Samsudin, Ruhaidah, et al.
Published: (2005)
by: Samsudin, Ruhaidah, et al.
Published: (2005)
Integration of spectral information into support vector machine for land cover classification
by: Md. Sap, Mohd. Noor, et al.
Published: (2007)
by: Md. Sap, Mohd. Noor, et al.
Published: (2007)
Proposing a framework for evaluating information quality of mobile interface design for electronic government services
by: Zamzami, Ikhlas F., et al.
Published: (2011)
by: Zamzami, Ikhlas F., et al.
Published: (2011)
The development of multi-agent system for biological information retrieval from heterogeneous distributed data and knowledge sources
by: Mat Yatim, Safie, et al.
Published: (2006)
by: Mat Yatim, Safie, et al.
Published: (2006)
Search strategies formulation among library and information science students in online database
by: Othman, Roslina, et al.
Published: (2014)
by: Othman, Roslina, et al.
Published: (2014)
Digitization of Arabic materials in IIUM Library : challenges and problems
by: Abdullah, Sarifah, et al.
Published: (2006)
by: Abdullah, Sarifah, et al.
Published: (2006)
Identifying the factors associated with undergraduates’ behaviour in seeking academic project information
by: Mohd Nadzir, Maslinda, et al.
Published: (2016)
by: Mohd Nadzir, Maslinda, et al.
Published: (2016)
IIUM Institutional Repository (IREP): how to expedite the verification process
by: Wan Salleh, Wan Salwati
Published: (2018)
by: Wan Salleh, Wan Salwati
Published: (2018)
Data selection mapping in mobile decision making using MCDSS technique
by: Anom, Raja Baharuddin, et al.
Published: (2007)
by: Anom, Raja Baharuddin, et al.
Published: (2007)
Searching for information on the web: A guideline for effective searching
by: Mat Yamin, Fadhilah, et al.
Published: (2012)
by: Mat Yamin, Fadhilah, et al.
Published: (2012)
Effectiveness of libraries in supporting researchers' information needs: The impact of a digital library
by: Ayob, Arinawati, et al.
Published: (2010)
by: Ayob, Arinawati, et al.
Published: (2010)
Web page classification method using neural networks
by: Selamat, Ali, et al.
Published: (2003)
by: Selamat, Ali, et al.
Published: (2003)
Map online system using internet-based image catalogue
by: Md. Sheriff, Noor Azam, et al.
Published: (2005)
by: Md. Sheriff, Noor Azam, et al.
Published: (2005)
A study on biomolecular sequence alignment using machine learning techniques
by: Othman, Muhamad Razib, et al.
Published: (2004)
by: Othman, Muhamad Razib, et al.
Published: (2004)
The design and development of a system for controlling automotive functions using speech recognition
by: Ahmad, Abd. Manan
Published: (2006)
by: Ahmad, Abd. Manan
Published: (2006)
A knowledge management approach to citizen relationship management in e-government context
by: Norshidah, Mohamed, et al.
Published: (2013)
by: Norshidah, Mohamed, et al.
Published: (2013)
Studies on mobile agents for query retrieval and web page categorization using neural networks
by: Selamat, Ali
Published: (2003)
by: Selamat, Ali
Published: (2003)
Langkah-langkah untuk deposit rekod ke dalam UTM-IR
by: Mohamed Jong, Kamariah
Published: (2007)
by: Mohamed Jong, Kamariah
Published: (2007)
Personal learning environment framework for a self-help Maqam-based search system
by: Othman, Roslina, et al.
Published: (2014)
by: Othman, Roslina, et al.
Published: (2014)
The role of culture: a successful knowledge creation (KC) and knowledge sharing (KS) within higher education institutions
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
Experimental evaluation of hybrid software engineering methodology for embedded firmware development on intelligent mobile robot
by: Abang Jawawi, Dayang Norhayati, et al.
Published: (2004)
by: Abang Jawawi, Dayang Norhayati, et al.
Published: (2004)
Impact of ICT on privacy and personal data protection in two Malaysian academic libraries
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
An authentication technique on electronic performance support system (EPSS) security in a web based environment
by: Sunar, Mohd. Shahrizal, et al.
Published: (2003)
by: Sunar, Mohd. Shahrizal, et al.
Published: (2003)
The development of cloud modelling and motion analysis for virtual environment
by: Sunar, Mohd. Shahrizal, et al.
Published: (2005)
by: Sunar, Mohd. Shahrizal, et al.
Published: (2005)
The development of real-time daylight sky colour simulation for virtual environment
by: Sunar, Mohd. Shahrizal, et al.
Published: (2005)
by: Sunar, Mohd. Shahrizal, et al.
Published: (2005)
Design and development of an intelligent security layer for web-based applications
by: Abdullah, Abdul Hanan, et al.
Published: (2005)
by: Abdullah, Abdul Hanan, et al.
Published: (2005)
Expressive properties of internet evolutionized malay words within the dimension of malay values and attitudes
by: Abd. Rozan, Mohd. Zaidi, et al.
Published: (2009)
by: Abd. Rozan, Mohd. Zaidi, et al.
Published: (2009)
Undergraduates' needs and seeking behaviour: A preliminary study
by: Mohd Nadzir, Maslinda, et al.
Published: (2015)
by: Mohd Nadzir, Maslinda, et al.
Published: (2015)
Undergraduates’ needs and seeking behaviour: A preliminary study
by: Mohd Nadzir, Maslinda, et al.
Published: (2015)
by: Mohd Nadzir, Maslinda, et al.
Published: (2015)
Design and development of intelligent knowledge discovery system for stock exchange database
by: Md. Sap, Mohd. Noor, et al.
Published: (2005)
by: Md. Sap, Mohd. Noor, et al.
Published: (2005)
Contrasting usage of web-based library services among postgraduate students by type of university within Malaysia
by: Mohd Zain, Wahidah, et al.
Published: (2016)
by: Mohd Zain, Wahidah, et al.
Published: (2016)
Out-of-core simplification with appearance preservation for computer game applications
by: Bade, Abdullah, et al.
Published: (2006)
by: Bade, Abdullah, et al.
Published: (2006)
The implementation of collaborative network for innovation process in higher education institutions (heis): a knowledge management perspective
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
Similar Items
-
Provider independent cryptographic tools
by: Ibrahim, Subariah, et al.
Published: (2003) -
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003) -
Health Information Security Guidelines for Healthcare Information Systems
by: Narayanan Samy , Ganthan, et al.
Published: (2011) -
Trends in information retrieval system
by: Othman, Roslina
Published: (2009) -
Interface characteristics, perceived ease of use, perceived usefulness and intention to use UUM e-library
by: Nik Mohd Baidzani Haddad, Ibrahim
Published: (2017)