Zero distortion-based steganography for handwritten signature
The growth of the Internet over the last few years has enabled many people and organisations, such as financial institutions, around the world communicate with each other and transfer information over public channels. In this light, public channels are used due the lack of private network infrast...
| Auteur principal: | Iranmanesh, Vahab |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2018
|
| Sujets: | |
| Accès en ligne: | http://psasir.upm.edu.my/id/eprint/71223/1/FK%202018%2078%20IR%286%29.pdf |
Documents similaires
Steganography in webpages using CSS color attributes enhanced by rule-based system
par: Nehzati, Seyedeh Sheida
Publié: (2016)
par: Nehzati, Seyedeh Sheida
Publié: (2016)
Character property method with biometric multifactor authentication for arabic text steganography
par: Roslan, Nuur Alifah
Publié: (2018)
par: Roslan, Nuur Alifah
Publié: (2018)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
par: M. Abulkhirat, Esam
Publié: (2003)
par: M. Abulkhirat, Esam
Publié: (2003)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
par: Mohamed Yassin, Warusia
Publié: (2015)
par: Mohamed Yassin, Warusia
Publié: (2015)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
par: H. Belgassem, Seddeq
Publié: (2004)
par: H. Belgassem, Seddeq
Publié: (2004)
New compendium of RSA vulnerabilities
par: Abd Ghafar, Amir Hamzah
Publié: (2020)
par: Abd Ghafar, Amir Hamzah
Publié: (2020)
Network security situation awareness based on indicators extracted
par: Xie, Zeqiang
Publié: (2016)
par: Xie, Zeqiang
Publié: (2016)
Design of a lightweight virtual honeynet based on linux container virtualization
par: Memari, Nogol
Publié: (2014)
par: Memari, Nogol
Publié: (2014)
Cryptanalysis of El-Gamal AAs cryptosystem
par: Mandangan, Arif
Publié: (2011)
par: Mandangan, Arif
Publié: (2011)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
par: Javan, Ali
Publié: (2011)
par: Javan, Ali
Publié: (2011)
Fake review annotation model and classification through reviewers' writing style
par: Shojaee, Somayeh
Publié: (2019)
par: Shojaee, Somayeh
Publié: (2019)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
par: Yusof, Siti Nabilah
Publié: (2023)
par: Yusof, Siti Nabilah
Publié: (2023)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
par: Abiodun, Balogun Kamoru
Publié: (2021)
par: Abiodun, Balogun Kamoru
Publié: (2021)
Secure block cipher inspired by the human immune system
par: Ariffin, Suriyani
Publié: (2012)
par: Ariffin, Suriyani
Publié: (2012)
A multi-factor authentication scheme using attack recognition and key generator technique
par: Mohd Ariffin, Noor Afiza
Publié: (2017)
par: Mohd Ariffin, Noor Afiza
Publié: (2017)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
par: Hadi, Ahmed Adnan
Publié: (2022)
par: Hadi, Ahmed Adnan
Publié: (2022)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
par: Mohd Nasir, Rinie Narinie
Publié: (2015)
par: Mohd Nasir, Rinie Narinie
Publié: (2015)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
par: Ismail, Haqi Khalid
Publié: (2021)
par: Ismail, Haqi Khalid
Publié: (2021)
New directions in forging multivariate signature schemes
par: Abdul Jamal, Nurul Amiera Sakinah
Publié: (2023)
par: Abdul Jamal, Nurul Amiera Sakinah
Publié: (2023)
Steganography For Embedding Data In Digital Image
par: Sowan, Salah Ibrahem
Publié: (2003)
par: Sowan, Salah Ibrahem
Publié: (2003)
Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
par: Ahmad, Miza Mumtaz
Publié: (2011)
par: Ahmad, Miza Mumtaz
Publié: (2011)
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
par: ‘Asri, Nur Nadia Syahirah
Publié: (2017)
par: ‘Asri, Nur Nadia Syahirah
Publié: (2017)
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
par: Ng, Roger Cheng Yong
Publié: (2006)
par: Ng, Roger Cheng Yong
Publié: (2006)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
par: Mustafa, Mohd Nawawi
Publié: (2015)
par: Mustafa, Mohd Nawawi
Publié: (2015)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
par: Zare Anari, Abbas Mehdizadeh
Publié: (2008)
par: Zare Anari, Abbas Mehdizadeh
Publié: (2008)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
par: Abdulkader, Zaid A.
Publié: (2018)
par: Abdulkader, Zaid A.
Publié: (2018)
Performance analysis and improvement of rabin primitive based cryptosystems
par: Mahad, Zahari
Publié: (2014)
par: Mahad, Zahari
Publié: (2014)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
par: Hussein, Noor Sabeeh
Publié: (2016)
par: Hussein, Noor Sabeeh
Publié: (2016)
Honeynet as a service deployment approach in enabling virtual crime scene investigation
par: Hasheminejad, Hamidreza
Publié: (2015)
par: Hasheminejad, Hamidreza
Publié: (2015)
Windows 10 instant messaging application forensics
par: Shehu, Aliyu Usman
Publié: (2018)
par: Shehu, Aliyu Usman
Publié: (2018)
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
par: Lee, Soon
Publié: (2011)
par: Lee, Soon
Publié: (2011)
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
par: Ali, Khalid Abdullahi
Publié: (2017)
par: Ali, Khalid Abdullahi
Publié: (2017)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
par: Roslan, Nuur Alifah
Publié: (2011)
par: Roslan, Nuur Alifah
Publié: (2011)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
par: Hydara, Isatou
Publié: (2015)
par: Hydara, Isatou
Publié: (2015)
Kembangan pseudotnaf untuk pendaraban skalar di atas lenkuk koblitz
par: Yunos, Faridah
Publié: (2014)
par: Yunos, Faridah
Publié: (2014)
An efficient anomaly intrusion detection method with evolutionary neural network
par: Sarvari, Samira
Publié: (2020)
par: Sarvari, Samira
Publié: (2020)
Bandwidth Performance Analysis of a Remote Monitoring Surveillance System
par: Syed Nor Azlan, Syarifah Ezdiani
Publié: (2006)
par: Syed Nor Azlan, Syarifah Ezdiani
Publié: (2006)
Performance analysis on detection and prevention of wormhole attack in wireless network
par: Apandi, Mohamad Aiman Hanif
Publié: (2019)
par: Apandi, Mohamad Aiman Hanif
Publié: (2019)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
par: Malekzadeh, Mina
Publié: (2011)
par: Malekzadeh, Mina
Publié: (2011)
Documents similaires
-
Steganography in webpages using CSS color attributes enhanced by rule-based system
par: Nehzati, Seyedeh Sheida
Publié: (2016) -
Character property method with biometric multifactor authentication for arabic text steganography
par: Roslan, Nuur Alifah
Publié: (2018) -
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
par: M. Abulkhirat, Esam
Publié: (2003) -
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
par: Mohamed Yassin, Warusia
Publié: (2015) -
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
par: H. Belgassem, Seddeq
Publié: (2004)