Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
The rapid advancement in digital computation, communication and exponential proliferation of the Internet has now become the easiest and economical way of data transmission. This evolution has gained the drawbacks in the advancement of forgery tools and application that enable perpetrators to steal,...
| Main Author: | Mehdi , Hussain |
|---|---|
| Format: | Thesis |
| Published: |
2017
|
| Subjects: |
Similar Items
Bit inverting map method for improved steganography scheme
by: Fadhil, Ammar Mohammedali
Published: (2016)
by: Fadhil, Ammar Mohammedali
Published: (2016)
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
by: Ali , Hussain
Published: (2021)
by: Ali , Hussain
Published: (2021)
MP3 audio steganography technique using extended least significant bit
by: Mohammed Atoum, Mohammed Salem
Published: (2014)
by: Mohammed Atoum, Mohammed Salem
Published: (2014)
DCT domain Stegasvm-shifted LSB model for highly
imperceptible and robust cover-image / Hanizan Shaker Hussain
by: Shaker Hussain, Hanizan
Published: (2014)
by: Shaker Hussain, Hanizan
Published: (2014)
A microservice-based architecture for an online product review analysis system / Mehdi Mohammadi
by: Mehdi , Mohammadi
Published: (2021)
by: Mehdi , Mohammadi
Published: (2021)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad
by: Mehdi , Jahanirad
Published: (2016)
by: Mehdi , Jahanirad
Published: (2016)
Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination
by: Jaafar, Sayuthi
Published: (2013)
by: Jaafar, Sayuthi
Published: (2013)
Blind colour image watermarking techniques in hybrid domain using least significant bit and slantlet transform
by: Hasan, Harith Raad
Published: (2014)
by: Hasan, Harith Raad
Published: (2014)
A feature-based dual-layer ensemble classification method for emotional state recognition / Mehdi Malekzadeh
by: Mehdi , Malekzadeh
Published: (2017)
by: Mehdi , Malekzadeh
Published: (2017)
A robust video watermarking using simulated block based spatial domain technique
by: Arab, Farnaz
Published: (2014)
by: Arab, Farnaz
Published: (2014)
A security framework for mobile health applications on android platform / Muzammil Hussain
by: Muzammil , Hussain
Published: (2017)
by: Muzammil , Hussain
Published: (2017)
The most interesting places in Malaysia multimedia interactive presentation / Nik Rozilah Nik Yaacob
by: Nik Yaacob, Nik Rozilah
Published: (2005)
by: Nik Yaacob, Nik Rozilah
Published: (2005)
Prototype development of VOIP steganography
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
An embedding traid-bit method to improve the performance of Arabic text steganography
by: Thabit, Reema Ahmed Abdalla
Published: (2016)
by: Thabit, Reema Ahmed Abdalla
Published: (2016)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Image steganography using least significant bit approach enhanced with compression and encryption
by: Bashardoost, Morteza
Published: (2012)
by: Bashardoost, Morteza
Published: (2012)
Analysis of Linguistic Steganography Tools
by: Shaifizat, Mansor
Published: (2004)
by: Shaifizat, Mansor
Published: (2004)
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010)
by: Zamani, Mazdak
Published: (2010)
Steganography based on utilizing more surrounding pixels
by: Afrakhteh, Masoud
Published: (2010)
by: Afrakhteh, Masoud
Published: (2010)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Steganography in GIF animated grayscale images
by: Yerlan, Massalin
Published: (2013)
by: Yerlan, Massalin
Published: (2013)
Privacy-by-design framework for privacy and personal data protection in mobile cloud computing / Hussain Mutlaq H Alnajrani
by: Hussain Mutlaq H , Alnajrani
Published: (2022)
by: Hussain Mutlaq H , Alnajrani
Published: (2022)
Development of calcium silicate composites for bone tissue engineering / Mehdi Mehrali
by: Mehdi, Mehrali
Published: (2015)
by: Mehdi, Mehrali
Published: (2015)
Triple scheme based on image steganography to improve imperceptibility and security
by: Hashim, Mohammed Mahdi
Published: (2022)
by: Hashim, Mohammed Mahdi
Published: (2022)
The impact of liberalization on uncovered interest rate parity
by: Chuan, Annie
Published: (2003)
by: Chuan, Annie
Published: (2003)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
An improved image steganography scheme based on distinction grade value and secret message encryption
by: Taha, Mustafa Sabah
Published: (2020)
by: Taha, Mustafa Sabah
Published: (2020)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Image restoration techniques in spatial domain and frequency domains / Osamah Jasim Madhloom
by: Osamah Jasim, Madhloom
Published: (2017)
by: Osamah Jasim, Madhloom
Published: (2017)
A new steganography technique using knight’s tour algorithm, affine cipher and huffman coding
by: Mohsin, Alla Talib
Published: (2013)
by: Mohsin, Alla Talib
Published: (2013)
The RTL design of 32-bit RISC processor using verilog HDL
by: Manab, Hafizul Hasni
Published: (2012)
by: Manab, Hafizul Hasni
Published: (2012)
An enhanced method based on intermediate significant bit technique for watermark images
by: Mohammed, Ghassan Nashat
Published: (2015)
by: Mohammed, Ghassan Nashat
Published: (2015)
A study on participatory management and conservation of mangrove ecosystem in Matang and Carey Island, Malaysia / Mehdi Almasi
by: Mehdi , Almasi
Published: (2018)
by: Mehdi , Almasi
Published: (2018)
Development and application of a dynamic conflict resolution method for integrated water resources management / Mehdi Zomorodian
by: Mehdi , Zomorodian
Published: (2018)
by: Mehdi , Zomorodian
Published: (2018)
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)
by: Islam, Md Shohidul
Published: (2025)
Optimization of medical image steganography using n-decomposition genetic algorithm
by: Al-Sarayefi, Bushra Abdullah Shtayt
Published: (2023)
by: Al-Sarayefi, Bushra Abdullah Shtayt
Published: (2023)
Energy performance and cost analysis of phase change materials with different melting temperature in heating systems / Mehdi Rezaei
by: Mehdi , Rezaei
Published: (2012)
by: Mehdi , Rezaei
Published: (2012)
Metabelian groups of order at most 24
by: Abdul Rahman, Siti Fatimah
Published: (2010)
by: Abdul Rahman, Siti Fatimah
Published: (2010)
International Parities and Business Cycle Synchronization in the Asia Pacific Region
by: Chan, Tze Haw
Published: (2009)
by: Chan, Tze Haw
Published: (2009)
Similar Items
-
Bit inverting map method for improved steganography scheme
by: Fadhil, Ammar Mohammedali
Published: (2016) -
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
by: Ali , Hussain
Published: (2021) -
MP3 audio steganography technique using extended least significant bit
by: Mohammed Atoum, Mohammed Salem
Published: (2014) -
DCT domain Stegasvm-shifted LSB model for highly
imperceptible and robust cover-image / Hanizan Shaker Hussain
by: Shaker Hussain, Hanizan
Published: (2014) -
A microservice-based architecture for an online product review analysis system / Mehdi Mohammadi
by: Mehdi , Mohammadi
Published: (2021)