Search Results - "steganography"

Refine Results
  1. 1

    Image steganography by Jeniffer, Chegaram

    Published 2012
    “…The Internet as a whole does not use secure links,thus information in transit may be vulnerable to interception as well.The important of reducing a chance of the information being detected during the transmission is being an issue now days.Some solution to be discussed is how to passing information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker.Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media.In this research,we clarify what steganography is,the definition,the importance as well as the technique used in implementing steganography. …”
    Get full text
    Get full text
  2. 2

    Effects on quality in audio steganography by Ho, Man Yen

    Published 2014
    “…This thesis focuses on effects on quality in audio steganography. Steganography is the science of hiding information, which is used to hiding the data from third party. …”
    Get full text
    Get full text
  3. 3

    Impact of image perceptibility in steganography by Phang, She Chin

    Published 2014
    “…This thesis discusses on the impact of image perceptibility in Image Steganography. By using the steganography to embed the secret message into the cover image. …”
    Get full text
    Get full text
  4. 4

    Information hiding using steganography by Mohamed Amin, Muhalim, Ibrahim, Subariah, Salleh, Mazleena, Katmin, Mohd. Rozi

    Published 2003
    “…In this research, we clarify what steganography is, the definition, the importance as well as the technique used in implementing steganography. …”
    Get full text
    Get full text
  5. 5

    Prototype development of VOIP steganography by Al-Othmani, Abdulaleem Zaid Mohammed

    Published 2009
    “…Indeed, along with encryption, steganography is one of the fundamental ways by which data can be kept confidential. …”
    Get full text
    Get full text
  6. 6

    Covert channel: network steganography deployment by Md Ali, Nurul Majdi

    Published 2005
    “…Steganography also denoted by art of hiding communication. …”
    Get full text
  7. 7

    A secure audio steganography approach by Zamani, Mazdak, Abdul Manaf, Azizah, Ahmad, Rabiah, Jaryani, Farhang, Taherdoost, Hamed, Zeki, Akram M.

    Published 2009
    “…A wide range of steganography techniques has been described in this paper. …”
    Get full text
    Get full text
  8. 8
  9. 9

    Steganography: Text File Hiding in Image by Yaw Choon, Kit

    Published 2013
    “…Steganography is the art or science in hiding. It is origin from the Greek work where stegano(hiding) + graphy(writing). …”
    Get full text
    Get full text
  10. 10

    Steganography For Embedding Data In Digital Image by Sowan, Salah Ibrahem

    Published 2003
    “…Digital carriers include email, audio, and images. Steganography, like cryptography, is a means of providing secrecy. …”
    Get full text
    Get full text
  11. 11

    Secret channel using video steganography by Lee, Kar Yee, Chuah, Chai Wen

    Published 2017
    “…Video steganography is about hiding the secret message into the video as the cover media. …”
    Get full text
    Get full text
  12. 12

    An improved image steganography algorithm based on PVD by Bhuiyan, Sharif Shah Newaj, Abdul Malek, Norun, Khalifa, Othman Omran, Abdul Rahman, Farah Diyana

    Published 2018
    “…In this paper, a modification of PVD (Pixel Value Differencing) algorithm is used for Image Steganography in spatial domain. It is normalizing secret data value by encoding method to make the new pixel edge difference less among three neighbors (horizontal, vertical and diagonal) and embedding data only to less intensity pixel difference areas or regions. …”
    Get full text
    Get full text
    Get full text
  13. 13
  14. 14

    An artificial-intelligence-based approach for audio steganography by Zamani, Mazdak, Taherdoost, Hamed, Abdul Manaf, Azizah, Ahmad, Rabiah, Zeki, Akram M.

    Published 2009
    “…This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio steganography. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. …”
    Get full text
    Get full text
  15. 15

    Exploring the challenges of MP3 audio steganography by Atoum, Mohammed Salem, Ibrahimn, Subariah, Sulong, Ghazali, Zeki, Akram M., Abubakar, Adamu

    Published 2014
    “…Several techniques have already been proposed for embedding data in MP3 files using steganography systems. Unfortunately, there are lacks of general emergence research on the issues and the challenges faced with the MP3 file in terms of steganography. …”
    Get full text
    Get full text
  16. 16

    Image Steganography Using Hash Function And Compression by Ahmad Sulaiman, Zurkifli

    Published 2023
    “…An image steganography is a method for concealing any data or secret messages within an image file. …”
    Get full text
    Get full text
  17. 17

    Reversible image steganography using ROI & RONI by Lim, Jee Chao

    Published 2019
    “…Reversible steganography allows to recover of original image without any distortion when the embedded secret message has extracted. …”
    Get full text
    Get full text
  18. 18

    Cryptography, Steganography, & Digital Watermarking for Text Documentation by Nurul Suzulyana, Zulkifley, Nur Haziqah, Zainal Abidin, Nurul Zulaikha, Sulaini, Muhamad Khairil Amir, Mohamad Nawi, Syifak Izhar, Hisham

    Published 2020
    “…At the end, this paper suggests the related techniques that can be implemented by the hospital management systems, which is a combination of digital watermarking and steganography.…”
    Get full text
    Get full text
    Get full text
  19. 19

    Anti-forensic steganography method based on randomization by Khalaf, Emad Taha, Norrozila, Sulaiman, Mohammed, Muamer N.

    Published 2013
    “…This work presents an anti-forensic steganography method that can embed and extract messages from images, which uses the same principle of LSB. …”
    Get full text
    Get full text
  20. 20

    Sharp-edges method in Arabic text steganography by Roslan, Nuur Alifah, Mahmod, Ramlan, Udzir, Nur Izura

    Published 2011
    “…One of the issues that arise in the text steganography is the capacity of hiding secret bit. Focusing in Arabic text steganography we propose a sharp-edges method to encounter the issue. …”
    Get full text
    Get full text