Steganography For Embedding Data In Digital Image
The growth of the World Wide Web (WWW) has enabled the personal computer to be used as a general communications tool. As in the case of other forms of communication there is a wish for security and privacy. With literally millions of images moving on the Internet each year, it is safe to say that...
| Auteur principal: | Sowan, Salah Ibrahem |
|---|---|
| Format: | Thèse |
| Langue: | anglais anglais |
| Publié: |
2003
|
| Sujets: | |
| Accès en ligne: | http://psasir.upm.edu.my/id/eprint/12166/1/FK_2003_25.pdf |
Documents similaires
Paper-based disposable electrowetting chip for microfluidic application
par: Ismail, Noor Faezah
Publié: (2018)
par: Ismail, Noor Faezah
Publié: (2018)
Zero distortion-based steganography for handwritten signature
par: Iranmanesh, Vahab
Publié: (2018)
par: Iranmanesh, Vahab
Publié: (2018)
Development and verification of predictive maintenance system in a solar cell manufacturing industry
par: Shahrir, Nurhaiza
Publié: (2013)
par: Shahrir, Nurhaiza
Publié: (2013)
Design and development of an automated mechanical valve for variable rate knapsack sprayer
par: Shamsi, Siti Mariam
Publié: (2017)
par: Shamsi, Siti Mariam
Publié: (2017)
Steganography in webpages using CSS color attributes enhanced by rule-based system
par: Nehzati, Seyedeh Sheida
Publié: (2016)
par: Nehzati, Seyedeh Sheida
Publié: (2016)
Monitoring of agricultural land abandonment using remote sensing technology
par: Mohamad Yusoff, Noryusdiana
Publié: (2016)
par: Mohamad Yusoff, Noryusdiana
Publié: (2016)
Synthesis and characterization of transparent superhydrophobic fluorinated graphene oxide and silica based sol gel coating films
par: Harun, Mohd Hamzah
Publié: (2020)
par: Harun, Mohd Hamzah
Publié: (2020)
Developing prosthetic artificial muscle actuator using dielectric elastomers
par: El-Hamad, Haneen Jawad Mahmoud
Publié: (2016)
par: El-Hamad, Haneen Jawad Mahmoud
Publié: (2016)
Computational study of an air ventilation system based on CFD simulation in hospital operation theatre environment
par: Faraj, Muneerah ABS
Publié: (2019)
par: Faraj, Muneerah ABS
Publié: (2019)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
par: Wong, Tze Jin
Publié: (2006)
par: Wong, Tze Jin
Publié: (2006)
Resource allocation techniques for interference mitigation in macro and femtocell heterogeneous network-based LTE system
par: Al-omari, Motea Saleh Mohammed
Publié: (2017)
par: Al-omari, Motea Saleh Mohammed
Publié: (2017)
Design and development of a seeding machine for system of rice intensification seedling tray
par: Abdulkadir, Tukur Daiyabu
Publié: (2019)
par: Abdulkadir, Tukur Daiyabu
Publié: (2019)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
par: Al-Saffar, Najlae Falah Hameed
Publié: (2015)
par: Al-Saffar, Najlae Falah Hameed
Publié: (2015)
An enhance embedding method using edge and textures detection for image steganography
par: Al-Maliki, Alaa Jabbar Qasim
Publié: (2024)
par: Al-Maliki, Alaa Jabbar Qasim
Publié: (2024)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
par: Mohd Ali, Fakariah Hani
Publié: (2004)
par: Mohd Ali, Fakariah Hani
Publié: (2004)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
par: Daud, Muhamad Azlan
Publié: (2014)
par: Daud, Muhamad Azlan
Publié: (2014)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
par: Asbullah, Muhammad Asyraf
Publié: (2015)
par: Asbullah, Muhammad Asyraf
Publié: (2015)
Mathematical aspects of selected block ciphers
par: Alqarni, Yazeed Saeed
Publié: (2015)
par: Alqarni, Yazeed Saeed
Publié: (2015)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
par: Yusof, Siti Nabilah
Publié: (2023)
par: Yusof, Siti Nabilah
Publié: (2023)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
par: Wan Mohd Ruzai, Wan Nur Aqlili
Publié: (2021)
par: Wan Mohd Ruzai, Wan Nur Aqlili
Publié: (2021)
Character property method with biometric multifactor authentication for arabic text steganography
par: Roslan, Nuur Alifah
Publié: (2018)
par: Roslan, Nuur Alifah
Publié: (2018)
Water Management for Kerian Irrigation Scheme Using Geographical Information System
par: Kamal, Md. Rowshon
Publié: (2000)
par: Kamal, Md. Rowshon
Publié: (2000)
Pelan Tindakan Kecemasan kebakaran bagi MTB dan CP KL International Airport (KLIA)
par: Mohd Yunus, Abd. Malik
Publié: (1999)
par: Mohd Yunus, Abd. Malik
Publié: (1999)
Continuous-wave fiber optical parametric amplifiers and oscillators
par: Lim, Lien Tze
Publié: (2015)
par: Lim, Lien Tze
Publié: (2015)
Encrypting text data using elliptic curve cryptography
par: Ali, Abas Abdullahi
Publié: (2018)
par: Ali, Abas Abdullahi
Publié: (2018)
Knowledge, awareness and practice of needle stick and sharps injuries among healthcare service providers in King Fahd Hospital Saudi Arabia
par: Awadh, Al Johani Abdulrahman
Publié: (2016)
par: Awadh, Al Johani Abdulrahman
Publié: (2016)
A new colour image steganography using LSB approach with halftoning determination embedding position
par: Hassan, Reband Jamil
Publié: (2014)
par: Hassan, Reband Jamil
Publié: (2014)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
par: Abd Ghafar, Amir Hamzah
Publié: (2015)
par: Abd Ghafar, Amir Hamzah
Publié: (2015)
Extention and cryptanalysis of golden cryptography
par: Sharabyan, Mohammad Tahghighi
Publié: (2015)
par: Sharabyan, Mohammad Tahghighi
Publié: (2015)
Annihilators through fault injection analysis on selected stream ciphers
par: Omar @ Othman, Wan Zariman
Publié: (2019)
par: Omar @ Othman, Wan Zariman
Publié: (2019)
Cryptanalysis of El-Gamal AAs cryptosystem
par: Mandangan, Arif
Publié: (2011)
par: Mandangan, Arif
Publié: (2011)
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
par: Kadhim, Al Karawi Hayder Natiq
Publié: (2019)
par: Kadhim, Al Karawi Hayder Natiq
Publié: (2019)
Factorization strategies of N = pq and N = pʳq and relation to its decryption exponent bound
par: Abubakar, Saidu Isah
Publié: (2018)
par: Abubakar, Saidu Isah
Publié: (2018)
New directions in forging multivariate signature schemes
par: Abdul Jamal, Nurul Amiera Sakinah
Publié: (2023)
par: Abdul Jamal, Nurul Amiera Sakinah
Publié: (2023)
Steganography for securing image data using hybrid SLT and DCT
par: Rachmawanto, Eko Hari
Publié: (2012)
par: Rachmawanto, Eko Hari
Publié: (2012)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
par: Khalaf, Emad T
Publié: (2012)
par: Khalaf, Emad T
Publié: (2012)
Digital Image Steganography Based On Integer Haar Wavelet Transform And Coefficient Difference
par: Prajanto, Wahyu Adi
Publié: (2014)
par: Prajanto, Wahyu Adi
Publié: (2014)
Perception and Awareness Among Food Manufacturers and Marketers on Halal Food in the Klang Valley
par: Abdullah, Ahmad Nizam
Publié: (2006)
par: Abdullah, Ahmad Nizam
Publié: (2006)
Effects of various conditions on and empirical modeling of baking process in convection oven
par: Mohamad Shahapuzi, Nur Syafikah
Publié: (2015)
par: Mohamad Shahapuzi, Nur Syafikah
Publié: (2015)
Data Hiding Techniques In Digital Images
par: Al Thloothi, Salah Ramadan
Publié: (2003)
par: Al Thloothi, Salah Ramadan
Publié: (2003)
Documents similaires
-
Paper-based disposable electrowetting chip for microfluidic application
par: Ismail, Noor Faezah
Publié: (2018) -
Zero distortion-based steganography for handwritten signature
par: Iranmanesh, Vahab
Publié: (2018) -
Development and verification of predictive maintenance system in a solar cell manufacturing industry
par: Shahrir, Nurhaiza
Publié: (2013) -
Design and development of an automated mechanical valve for variable rate knapsack sprayer
par: Shamsi, Siti Mariam
Publié: (2017) -
Steganography in webpages using CSS color attributes enhanced by rule-based system
par: Nehzati, Seyedeh Sheida
Publié: (2016)