Genetic based substitution techniques for audio steganography
Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most im...
| Main Author: | Zamani, Mazdak |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/847/ http://eprints.utm.my/847/19/MazdakZamaniPFSKSM2010.pdf |
Similar Items
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
An artificial-intelligence-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Robust Audio Steganography via Genetic Algorithm
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
A Novel Approach for Audio Watermarking
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
Steganography based on utilizing more surrounding pixels
by: Afrakhteh, Masoud
Published: (2010)
by: Afrakhteh, Masoud
Published: (2010)
A new embedding technique based on psychovisual threshold for robust and secure compressed video steganography
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
Prototype development of VOIP steganography
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
An Improved Image Steganography Scheme Based on RDWT and QR Decomposition
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018)
by: Ng, Ke-Huey, et al.
Published: (2018)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
by: Mehdi , Hussain
Published: (2017)
by: Mehdi , Hussain
Published: (2017)
Substitution-based approach for linguistic steganography using antonym
by: Mansor, Fawwaz Zamir
Published: (2017)
by: Mansor, Fawwaz Zamir
Published: (2017)
An improved rdwt-based image steganography scheme using qr decomposition and human visual system
by: Ng, Ke Huey
Published: (2021)
by: Ng, Ke Huey
Published: (2021)
Dynamics of watermark position in audio watermarked
files using neural networks
by: Abubakar, Adamu, et al.
Published: (2017)
by: Abubakar, Adamu, et al.
Published: (2017)
Result comparison of model validation techniques on audio-visual speech recognition
by: Thum, Wei Seong, et al.
Published: (2017)
by: Thum, Wei Seong, et al.
Published: (2017)
Prototype development for embedding large amount of information using secure LSB and neural based steganography
by: Saleh, Basam N.
Published: (2009)
by: Saleh, Basam N.
Published: (2009)
Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm
by: Noor Azam, Muhammad Harith, et al.
Published: (2023)
by: Noor Azam, Muhammad Harith, et al.
Published: (2023)
Online whiteboard (audio conferencing module) / Wong Chan Weng
by: Wong, Chan Weng
Published: (2001)
by: Wong, Chan Weng
Published: (2001)
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
An analysis of alphabet-based techniques in text steganography
by: Osman, Baharudin, et al.
Published: (2016)
by: Osman, Baharudin, et al.
Published: (2016)
A noun-based feature location approach supported by time aware term-weighting technique for facilitating software maintenance / Sima Zamani
by: Sima , Zamani
Published: (2016)
by: Sima , Zamani
Published: (2016)
Performance of different operation techniques applied in genetic algorithm towards benchmark functions
by: Ong, Chin Hwa
Published: (2018)
by: Ong, Chin Hwa
Published: (2018)
Performance of voice over IP (VoIP) over a wireless LAN (WLAN) for different audio/voice codecs
by: Mohd., Alias, et al.
Published: (2007)
by: Mohd., Alias, et al.
Published: (2007)
Exploring the challenges of MP3 audio steganography
by: Atoum, Mohammed Salem, et al.
Published: (2014)
by: Atoum, Mohammed Salem, et al.
Published: (2014)
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Critical analysis on steganography technique in text domain
by: Utama, Sunariya, et al.
Published: (2016)
by: Utama, Sunariya, et al.
Published: (2016)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Utilizing the roulette wheel based social network search algorithm for substitution box construction and optimization
by: Kamal Z., Zamli, et al.
Published: (2023)
by: Kamal Z., Zamli, et al.
Published: (2023)
Similar Items
-
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009) -
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009) -
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009) -
An artificial-intelligence-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009) -
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)