Digital Image Watermarking Using LSB Method
Nowadays, the transmision of data is very important and it has been carried out by using digital media (Internet, e-mail). There are some problems that may occur in the transmission of digital media data which is associated with data security level to be sent. Base on that condition, the thought of...
| Main Author: | ., Maulidin |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/2837/1/Maulidin.pdf https://etd.uum.edu.my/2837/2/1.Maulidin.pdf https://etd.uum.edu.my/2837/ |
| Abstract | Abstract here |
Similar Items
Efficient 2-level image tamper detection using 3 LSB watermarking technique
by: Sajjad Dadkhah
Published: (2025)
by: Sajjad Dadkhah
Published: (2025)
Enhancing Svd-Based Image
Watermarking Strategies Based On
Digital Chaos
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
Digital watermarking in 2D and 3D transform domains focusing on fidelity and robustness / Almas Abbasi
by: Almas, Abbasi
Published: (2015)
by: Almas, Abbasi
Published: (2015)
Robust and imperceptible digital video watermarking techniques.
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
Robust And Imperceptible Digital Video
Watermarking Techniques
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
An analysis of enhanced lossless compression methods for road map images / Ng Choon Boon
by: Ng, Choon Boon
Published: (2003)
by: Ng, Choon Boon
Published: (2003)
Basic Components in Creating Contents for Mathematics Subject Using Digital Wayang Kulit: A Conceptual Model
by: Mohd Amran, Md Ali
Published: (2011)
by: Mohd Amran, Md Ali
Published: (2011)
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
by: Odeh, Ali Ahmad Alabd Abu
Published: (2012)
by: Odeh, Ali Ahmad Alabd Abu
Published: (2012)
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
by: Somayeh, Sadeghi
Published: (2015)
by: Somayeh, Sadeghi
Published: (2015)
Paperless Online Banking (e-Cheque Imaging)
by: Mustafa, Mahdi (N. F) B.
Published: (2008)
by: Mustafa, Mahdi (N. F) B.
Published: (2008)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Web-Based Application House Monitoring System Through Image Transfer
by: Hasan, Hamdi H.
Published: (2008)
by: Hasan, Hamdi H.
Published: (2008)
Steganalysis: Detecting Existence of File Types Embedded in Grey Scale Image
by: Amirulikhsan, Zolkafli
Published: (2008)
by: Amirulikhsan, Zolkafli
Published: (2008)
Best- location technique for mammogram Authentication by LSB based watermarking
by: Cik Feresa Binti Mohd Foozy
Published: (2025)
by: Cik Feresa Binti Mohd Foozy
Published: (2025)
Information needs of academic staff at the University of Malaya in a digital environment / Harvinder Kaur a/p Bakhtawar Singh.
by: Bakhtawar Singh, Harvinder Kaur
Published: (2000)
by: Bakhtawar Singh, Harvinder Kaur
Published: (2000)
Invariants generation for method overriding using abstract interpretation / Siti Hafizah Ab. Hamid
by: Ab. Hamid, Siti Hafizah
Published: (2013)
by: Ab. Hamid, Siti Hafizah
Published: (2013)
Content-based image retrieval of blood cells based on colour / Alagu Rathina Bairavi
by: Bairavi, Alagu Rathina
Published: (2009)
by: Bairavi, Alagu Rathina
Published: (2009)
On-orbit spatial image characterisation and restoration based on stochastic characteristic targets / Wong Soo Mee
by: Wong , Soo Mee
Published: (2021)
by: Wong , Soo Mee
Published: (2021)
Level set segmentation of MR images for extraction of femur bone and tissues / by Christina Shanti Nayagam.
by: Nayagam, Christina Shanti
Published: (2002)
by: Nayagam, Christina Shanti
Published: (2002)
Gray-scale image steganography using LSB insertion and fibonacci
by: Toh, Pui Ling
Published: (2025)
by: Toh, Pui Ling
Published: (2025)
Retrieval of human facial images based on visual content and semantic description / Ahmed Abdu Ali Alattab
by: Alattab, Ahmed Abdu Ali
Published: (2013)
by: Alattab, Ahmed Abdu Ali
Published: (2013)
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012)
by: Shuwandy, Moceheb Lazam
Published: (2012)
A study on image security in social media using digital watermarking with metadata
by: Mohd. Aliff Faiz Jeffry
Published: (2025)
by: Mohd. Aliff Faiz Jeffry
Published: (2025)
The Impact of Missing Value Methods and Normalization Techniques on the Performance of Data Mining Models
by: Munirah, Yahya
Published: (2011)
by: Munirah, Yahya
Published: (2011)
Test data generation method for dynamic - structural testing in automatic programming assessment
by: Sarker, Md. Shahadath
Published: (2016)
by: Sarker, Md. Shahadath
Published: (2016)
An automatic failure recovery method for world-altering composite semantic web services / Hadi Saboohi
by: Saboohi, Hadi
Published: (2013)
by: Saboohi, Hadi
Published: (2013)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
A feature-based dual-layer ensemble classification method for emotional state recognition / Mehdi Malekzadeh
by: Mehdi , Malekzadeh
Published: (2017)
by: Mehdi , Malekzadeh
Published: (2017)
Digital grayscale image watermarking using discrete wavelet transform with quantization coefficient
by: Ihab Abdulkareem Neamah
Published: (2025)
by: Ihab Abdulkareem Neamah
Published: (2025)
Comparative study of robust invisible digital image watermarking for copyright protection
by: Nurshahirah Nadirah Jaafar
Published: (2025)
by: Nurshahirah Nadirah Jaafar
Published: (2025)
An improved scaling factor for robust digital image watermarking scheme using DWT and SVD
by: Rahmah Mohd. Lokoman
Published: (2025)
by: Rahmah Mohd. Lokoman
Published: (2025)
Old Jawi manuscript: Digital recognition / Zaidi Razak
by: Zaidi, Razak
Published: (2016)
by: Zaidi, Razak
Published: (2016)
Image steganography using Least Significant Bit (LSB) and knight tour algorithm
by: Soo, Ann Nie
Published: (2025)
by: Soo, Ann Nie
Published: (2025)
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
by: Ali , Hussain
Published: (2021)
by: Ali , Hussain
Published: (2021)
The Use of Multimedia Material of Teaching Modern Mathematics
by: Layous, Mohammad Kaisb
Published: (2011)
by: Layous, Mohammad Kaisb
Published: (2011)
Modeling Teacher's Integrity Using Data Mining
by: Mohd Latifi, Abdul Ghani
Published: (2010)
by: Mohd Latifi, Abdul Ghani
Published: (2010)
Analyzing DNA Sequences Using Clustering Algorithm
by: Alhersh, Taha Talib Ragheb
Published: (2009)
by: Alhersh, Taha Talib Ragheb
Published: (2009)
Software Classification Using Structure-Based Descriptors
by: Ramadan, Qusai Hussein
Published: (2009)
by: Ramadan, Qusai Hussein
Published: (2009)
Similar Items
-
Efficient 2-level image tamper detection using 3 LSB watermarking technique
by: Sajjad Dadkhah
Published: (2025) -
Enhancing Svd-Based Image
Watermarking Strategies Based On
Digital Chaos
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022) -
Digital watermarking in 2D and 3D transform domains focusing on fidelity and robustness / Almas Abbasi
by: Almas, Abbasi
Published: (2015) -
Robust and imperceptible digital video watermarking techniques.
by: Al-Taweel, Sadik Ali Murshid
Published: (2011) -
Robust And Imperceptible Digital Video
Watermarking Techniques
by: al-Taweel, Sadik Ali Murshid
Published: (2011)