Digital Image Watermarking Using LSB Method
Nowadays, the transmision of data is very important and it has been carried out by using digital media (Internet, e-mail). There are some problems that may occur in the transmission of digital media data which is associated with data security level to be sent. Base on that condition, the thought of...
| Main Author: | ., Maulidin |
|---|---|
| Format: | Dissertation |
| Language: | English English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/2837/1/Maulidin.pdf https://etd.uum.edu.my/2837/2/1.Maulidin.pdf https://etd.uum.edu.my/2837/ |
| Abstract | Abstract here |
Similar Items
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014)
by: Ahmed, Zamzam Hohamed
Published: (2014)
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
by: Then,, Patrick Hang Hui
Published: (2007)
by: Then,, Patrick Hang Hui
Published: (2007)
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011)
by: Liew, Siew Chuin
Published: (2011)
PDF digital watermarking grayscale photocopy detection of printed documents
by: Soong, Hoong Cheng
Published: (2010)
by: Soong, Hoong Cheng
Published: (2010)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit
by: Abdullah Bamatraf, Abdullah Omar
Published: (2012)
by: Abdullah Bamatraf, Abdullah Omar
Published: (2012)
Digital watermarking in 2D and 3D transform domains focusing on fidelity and robustness / Almas Abbasi
by: Almas, Abbasi
Published: (2015)
by: Almas, Abbasi
Published: (2015)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
Digital Watermarking in Medical Images
by: Jasni, Mohamad Zain
Published: (2005)
by: Jasni, Mohamad Zain
Published: (2005)
Enhancing Svd-Based Image
Watermarking Strategies Based On
Digital Chaos
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
An analysis of enhanced lossless compression methods for road map images / Ng Choon Boon
by: Ng, Choon Boon
Published: (2003)
by: Ng, Choon Boon
Published: (2003)
Efficient 2-level image tamper detection using 3 LSB watermarking technique
by: Sajjad Dadkhah
Published: (2025)
by: Sajjad Dadkhah
Published: (2025)
Enhanced LSB watermarking methods based on scanning patterns for authentication of medical images
by: Syifak Izhar, Hisham
Published: (2016)
by: Syifak Izhar, Hisham
Published: (2016)
Oil palm tree Crowns delineation and enumeration using satellite images
by: Chai, Soo See
Published: (2003)
by: Chai, Soo See
Published: (2003)
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
by: Odeh, Ali Ahmad Alabd Abu
Published: (2012)
by: Odeh, Ali Ahmad Alabd Abu
Published: (2012)
Robust And Imperceptible Digital Video
Watermarking Techniques
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
Robust and imperceptible digital video watermarking techniques.
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
Basic Components in Creating Contents for Mathematics Subject Using Digital Wayang Kulit: A Conceptual Model
by: Mohd Amran, Md Ali
Published: (2011)
by: Mohd Amran, Md Ali
Published: (2011)
Design of low power high speed digital vedic multiplier using 13T hybrid full adder
by: Lee, Shing Jie
Published: (2018)
by: Lee, Shing Jie
Published: (2018)
An improved file carver of intertwined jpeg images using X_myKarve
by: Abdullah, Nurul Azma
Published: (2014)
by: Abdullah, Nurul Azma
Published: (2014)
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
by: Somayeh, Sadeghi
Published: (2015)
by: Somayeh, Sadeghi
Published: (2015)
Paperless Online Banking (e-Cheque Imaging)
by: Mustafa, Mahdi (N. F) B.
Published: (2008)
by: Mustafa, Mahdi (N. F) B.
Published: (2008)
Andragogical Perspectives in Designing Digital Games for Older Adults: Maximizing Interaction and Experience
by: Nurul Farinah, Mohsin
Published: (2023)
by: Nurul Farinah, Mohsin
Published: (2023)
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)
by: Abd Halim, Muhamad Rais
Published: (2016)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
Threshold center-symmetric local binary convolutional neural networks for bilingual handwritten digit recognition
by: Saleh Al-Wajih, Ebrahim Qasem
Published: (2022)
by: Saleh Al-Wajih, Ebrahim Qasem
Published: (2022)
Contrast optimization by region adaptation (COBRA) for grey scale images
by: Ahmed, Muhammad Mahmood
Published: (2013)
by: Ahmed, Muhammad Mahmood
Published: (2013)
Spiral bit-map signature for content-based images retrieval
by: Wang, Hui Hui
Published: (2003)
by: Wang, Hui Hui
Published: (2003)
Shape feature representation in similarity measurement for content-based image retrieval
by: Chiew, Kang Leng
Published: (2003)
by: Chiew, Kang Leng
Published: (2003)
Steganalysis: Detecting Existence of File Types Embedded in Grey Scale Image
by: Amirulikhsan, Zolkafli
Published: (2008)
by: Amirulikhsan, Zolkafli
Published: (2008)
Web-Based Application House Monitoring System Through Image Transfer
by: Hasan, Hamdi H.
Published: (2008)
by: Hasan, Hamdi H.
Published: (2008)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Efficient architectures of heterogeneous fpga-gpu for 3-d medical image compression
by: Muharam, Azlan
Published: (2019)
by: Muharam, Azlan
Published: (2019)
Invariants generation for method overriding using abstract interpretation / Siti Hafizah Ab. Hamid
by: Ab. Hamid, Siti Hafizah
Published: (2013)
by: Ab. Hamid, Siti Hafizah
Published: (2013)
Information needs of academic staff at the University of Malaya in a digital environment / Harvinder Kaur a/p Bakhtawar Singh.
by: Bakhtawar Singh, Harvinder Kaur
Published: (2000)
by: Bakhtawar Singh, Harvinder Kaur
Published: (2000)
Optimized feature construction methods for data summarization methods for data summarization of relational data
by: Florence Sia, Fui Sze
Published: (2014)
by: Florence Sia, Fui Sze
Published: (2014)
Content-based image retrieval of blood cells based on colour / Alagu Rathina Bairavi
by: Bairavi, Alagu Rathina
Published: (2009)
by: Bairavi, Alagu Rathina
Published: (2009)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
Similar Items
-
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014) -
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018) -
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
by: Then,, Patrick Hang Hui
Published: (2007) -
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011) -
PDF digital watermarking grayscale photocopy detection of printed documents
by: Soong, Hoong Cheng
Published: (2010)
