A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
The ability of sending a secret message through a network nowadays has become a more challenging and complex process. One of the reasons why we need tools to detect the hidden message is because of security and safety. Secret messages can be both for good or bad, and subversive groups have been know...
| Main Author: | Puriwat, Lertkrai |
|---|---|
| Format: | Dissertation |
| Language: | English English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/3320/1/PURIWAT_LERTKRAI.pdf https://etd.uum.edu.my/3320/3/PURIWAT_LERTKRAI.pdf https://etd.uum.edu.my/3320/ |
| Abstract | Abstract here |
Similar Items
Steganalysis: Detecting Existence of File Types Embedded in Grey Scale Image
by: Amirulikhsan, Zolkafli
Published: (2008)
by: Amirulikhsan, Zolkafli
Published: (2008)
An enhanced android botnet detection approach using feature refinement
by: Anwar, Shahid
Published: (2019)
by: Anwar, Shahid
Published: (2019)
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
by: Rawaa Dawoud Hassan, Al-Dabbagh
Published: (2015)
by: Rawaa Dawoud Hassan, Al-Dabbagh
Published: (2015)
Hybrid intelligent approach for network intrusion detection
by: Al-Mohammed, Wael Hasan Ali
Published: (2015)
by: Al-Mohammed, Wael Hasan Ali
Published: (2015)
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019)
by: Zahedeh, Zamanian
Published: (2019)
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
by: Seyed Asadollah, Abdiesfandani
Published: (2016)
by: Seyed Asadollah, Abdiesfandani
Published: (2016)
Artificial Bee Colony With Differential Evolution Algorithm For Feature Extraction And Selection Of Mass Spectrometry Data
by: Mohamed Yusoff, Syarifah Adilah
Published: (2016)
by: Mohamed Yusoff, Syarifah Adilah
Published: (2016)
A fuzzy approach for early human action detection / Ekta Vats
by: Ekta, Vats
Published: (2016)
by: Ekta, Vats
Published: (2016)
A hyperbolic sarcasm detection model using negative sentiment tweets and machine learning algorithms / Vithyatheri Govindan
by: Vithyatheri , Govindan
Published: (2024)
by: Vithyatheri , Govindan
Published: (2024)
An Analysis of Node/Peer Discovery Approach and Routing Algorithms in Mobile & Traditional Peer-to-Peer Networks
by: Abdullahi, Mohamed Omar
Published: (2012)
by: Abdullahi, Mohamed Omar
Published: (2012)
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
by: Sani , Danjuma
Published: (2017)
by: Sani , Danjuma
Published: (2017)
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
by: Bian, Hui
Published: (2025)
by: Bian, Hui
Published: (2025)
Image splicing detection approach based on low dimensional SVD features and kernel PCA / Zahra Moghaddasi
by: Zahra, Moghaddasi
Published: (2017)
by: Zahra, Moghaddasi
Published: (2017)
Image manipulations analysis and detection methods for reflection-based attacks / Nor Bakiah Abd. Warif
by: Nor Bakiah, Abd. Warif
Published: (2018)
by: Nor Bakiah, Abd. Warif
Published: (2018)
Automatic detection methods of students’ learning styles in learning management system / Li Ling Xiao
by: Li , Ling Xiao
Published: (2019)
by: Li , Ling Xiao
Published: (2019)
Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak
by: Saqib Iqbal , Hakak
Published: (2018)
by: Saqib Iqbal , Hakak
Published: (2018)
Curved text detection and ground truth generation for natural scene images / Ch’ng Chee Kheng
by: Ch’ng, Chee Kheng
Published: (2018)
by: Ch’ng, Chee Kheng
Published: (2018)
Model-based hybrid variational level set method applied to object detection in grey scale images
by: Wang, Jing
Published: (2024)
by: Wang, Jing
Published: (2024)
Effective methods to detect cyberbullying and influential spreaders in an online social network / Mohammed Ali Derhem Al Garadi
by: Mohammed Ali Derhem , Al Garadi
Published: (2017)
by: Mohammed Ali Derhem , Al Garadi
Published: (2017)
Fuzzy petri nets as a classification method for automatic speech intelligibility detection of children with speech impairments / Fadhilah Rosdi
by: Fadhilah, Rosdi
Published: (2016)
by: Fadhilah, Rosdi
Published: (2016)
The fusion of particle swarm optimization (PSO) and interior point method (IPM) as cooperative movement control algorithm in Swarm Robotics / Dada Emmanuel Gbenga
by: Dada Emmanuel, Gbenga
Published: (2016)
by: Dada Emmanuel, Gbenga
Published: (2016)
Contour-KNN Brahmi Segmentation (CKBS) and Two-Phase Enhanced Brahmi Recognition (TREBR) Methods for Automatic Brahmi Texts Labelling
by: Neha, Gautam
Published: (2024)
by: Neha, Gautam
Published: (2024)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
An enhanced color image encryption algorithm using LT-PRNG
by: Mohammed Ismael, Saba
Published: (2018)
by: Mohammed Ismael, Saba
Published: (2018)
Vehicle routing problem using genetic algorithm / Shamini Nagaratnam
by: Shamini , Nagaratnam
Published: (2006)
by: Shamini , Nagaratnam
Published: (2006)
Piper nigrum Classification using Artificial Bee Colony Algorithm
by: Siti Hazemah, binti Hassan
Published: (2018)
by: Siti Hazemah, binti Hassan
Published: (2018)
Facial Expression Synthesis using Kernel Approach
by: Marcella, Peter
Published: (2020)
by: Marcella, Peter
Published: (2020)
Phishing Website Detection Using Website Logo
by: Chang, Ee Hung
Published: (2019)
by: Chang, Ee Hung
Published: (2019)
Topic identification using filtering and rule generation algorithm for textual document
by: Nurul Syafidah, Jamil
Published: (2015)
by: Nurul Syafidah, Jamil
Published: (2015)
3D Face Analysis using Tensor Approach
by: Suriani, Ab Rahman
Published: (2022)
by: Suriani, Ab Rahman
Published: (2022)
Development of Time Domain Inverse Scattering Algorithm for the Detection and Imaging of Buried Objects
by: Deanne, Edwin
Published: (2020)
by: Deanne, Edwin
Published: (2020)
A deep learning approach for facial detection in targeted billboard advertising / Lau Sian En
by: Lau , Sian En
Published: (2025)
by: Lau , Sian En
Published: (2025)
Evaluation of Visual Network Algorithms on Historical Documents
by: Khairunnisa, Binti Ibrahim
Published: (2020)
by: Khairunnisa, Binti Ibrahim
Published: (2020)
Tag clouds algorithm with the inclusion of personality traits
by: Ahmad Affandi, Supli
Published: (2015)
by: Ahmad Affandi, Supli
Published: (2015)
Identifying COVID-19 Hotspots using Bipartite Network Approach
by: Hong, Boon Hao
Published: (2023)
by: Hong, Boon Hao
Published: (2023)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
The Bacterial Foraging Optimisation Algorithm using Prototype Selection and Prototype Generation for Data Classification
by: Faizol, Bin Mohd Suria
Published: (2020)
by: Faizol, Bin Mohd Suria
Published: (2020)
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
by: Nassirtoussi, Arman Khadjeh
Published: (2015)
by: Nassirtoussi, Arman Khadjeh
Published: (2015)
Shortest Path Trajectory System Based on Dijkstra Algorithm
by: Putri, Indah Pratiwi
Published: (2012)
by: Putri, Indah Pratiwi
Published: (2012)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Similar Items
-
Steganalysis: Detecting Existence of File Types Embedded in Grey Scale Image
by: Amirulikhsan, Zolkafli
Published: (2008) -
An enhanced android botnet detection approach using feature refinement
by: Anwar, Shahid
Published: (2019) -
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
by: Rawaa Dawoud Hassan, Al-Dabbagh
Published: (2015) -
Hybrid intelligent approach for network intrusion detection
by: Al-Mohammed, Wael Hasan Ali
Published: (2015) -
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019)
