Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
The rapid advancement in digital computation, communication and exponential proliferation of the Internet has now become the easiest and economical way of data transmission. This evolution has gained the drawbacks in the advancement of forgery tools and application that enable perpetrators to steal,...
| Auteur principal: | Mehdi , Hussain |
|---|---|
| Format: | Thèse |
| Publié: |
2017
|
| Sujets: |
Documents similaires
Bit inverting map method for improved steganography scheme
par: Fadhil, Ammar Mohammedali
Publié: (2016)
par: Fadhil, Ammar Mohammedali
Publié: (2016)
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
par: Ali , Hussain
Publié: (2021)
par: Ali , Hussain
Publié: (2021)
MP3 audio steganography technique using extended least significant bit
par: Mohammed Atoum, Mohammed Salem
Publié: (2014)
par: Mohammed Atoum, Mohammed Salem
Publié: (2014)
DCT domain Stegasvm-shifted LSB model for highly
imperceptible and robust cover-image / Hanizan Shaker Hussain
par: Shaker Hussain, Hanizan
Publié: (2014)
par: Shaker Hussain, Hanizan
Publié: (2014)
A microservice-based architecture for an online product review analysis system / Mehdi Mohammadi
par: Mehdi , Mohammadi
Publié: (2021)
par: Mehdi , Mohammadi
Publié: (2021)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
par: Sookhak, Mehdi
Publié: (2015)
par: Sookhak, Mehdi
Publié: (2015)
Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad
par: Mehdi , Jahanirad
Publié: (2016)
par: Mehdi , Jahanirad
Publié: (2016)
Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination
par: Jaafar, Sayuthi
Publié: (2013)
par: Jaafar, Sayuthi
Publié: (2013)
Blind colour image watermarking techniques in hybrid domain using least significant bit and slantlet transform
par: Hasan, Harith Raad
Publié: (2014)
par: Hasan, Harith Raad
Publié: (2014)
A feature-based dual-layer ensemble classification method for emotional state recognition / Mehdi Malekzadeh
par: Mehdi , Malekzadeh
Publié: (2017)
par: Mehdi , Malekzadeh
Publié: (2017)
A robust video watermarking using simulated block based spatial domain technique
par: Arab, Farnaz
Publié: (2014)
par: Arab, Farnaz
Publié: (2014)
A security framework for mobile health applications on android platform / Muzammil Hussain
par: Muzammil , Hussain
Publié: (2017)
par: Muzammil , Hussain
Publié: (2017)
The most interesting places in Malaysia multimedia interactive presentation / Nik Rozilah Nik Yaacob
par: Nik Yaacob, Nik Rozilah
Publié: (2005)
par: Nik Yaacob, Nik Rozilah
Publié: (2005)
Prototype development of VOIP steganography
par: Al-Othmani, Abdulaleem Zaid Mohammed
Publié: (2009)
par: Al-Othmani, Abdulaleem Zaid Mohammed
Publié: (2009)
An embedding traid-bit method to improve the performance of Arabic text steganography
par: Thabit, Reema Ahmed Abdalla
Publié: (2016)
par: Thabit, Reema Ahmed Abdalla
Publié: (2016)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
par: Khalaf, Emad T
Publié: (2012)
par: Khalaf, Emad T
Publié: (2012)
Image steganography using least significant bit approach enhanced with compression and encryption
par: Bashardoost, Morteza
Publié: (2012)
par: Bashardoost, Morteza
Publié: (2012)
Analysis of Linguistic Steganography Tools
par: Shaifizat, Mansor
Publié: (2004)
par: Shaifizat, Mansor
Publié: (2004)
Genetic based substitution techniques for audio steganography
par: Zamani, Mazdak
Publié: (2010)
par: Zamani, Mazdak
Publié: (2010)
Steganography based on utilizing more surrounding pixels
par: Afrakhteh, Masoud
Publié: (2010)
par: Afrakhteh, Masoud
Publié: (2010)
Secured email using steganography / Syaiful Annuar Omar
par: Syaiful Annuar, Omar
Publié: (2005)
par: Syaiful Annuar, Omar
Publié: (2005)
Steganography in GIF animated grayscale images
par: Yerlan, Massalin
Publié: (2013)
par: Yerlan, Massalin
Publié: (2013)
Privacy-by-design framework for privacy and personal data protection in mobile cloud computing / Hussain Mutlaq H Alnajrani
par: Hussain Mutlaq H , Alnajrani
Publié: (2022)
par: Hussain Mutlaq H , Alnajrani
Publié: (2022)
Development of calcium silicate composites for bone tissue engineering / Mehdi Mehrali
par: Mehdi, Mehrali
Publié: (2015)
par: Mehdi, Mehrali
Publié: (2015)
Triple scheme based on image steganography to improve imperceptibility and security
par: Hashim, Mohammed Mahdi
Publié: (2022)
par: Hashim, Mohammed Mahdi
Publié: (2022)
The impact of liberalization on uncovered interest rate parity
par: Chuan, Annie
Publié: (2003)
par: Chuan, Annie
Publié: (2003)
Steganography in webpages using CSS color attributes enhanced by rule-based system
par: Nehzati, Seyedeh Sheida
Publié: (2016)
par: Nehzati, Seyedeh Sheida
Publié: (2016)
An improved image steganography scheme based on distinction grade value and secret message encryption
par: Taha, Mustafa Sabah
Publié: (2020)
par: Taha, Mustafa Sabah
Publié: (2020)
Zero distortion-based steganography for handwritten signature
par: Iranmanesh, Vahab
Publié: (2018)
par: Iranmanesh, Vahab
Publié: (2018)
Image restoration techniques in spatial domain and frequency domains / Osamah Jasim Madhloom
par: Osamah Jasim, Madhloom
Publié: (2017)
par: Osamah Jasim, Madhloom
Publié: (2017)
A new steganography technique using knight’s tour algorithm, affine cipher and huffman coding
par: Mohsin, Alla Talib
Publié: (2013)
par: Mohsin, Alla Talib
Publié: (2013)
The RTL design of 32-bit RISC processor using verilog HDL
par: Manab, Hafizul Hasni
Publié: (2012)
par: Manab, Hafizul Hasni
Publié: (2012)
An enhanced method based on intermediate significant bit technique for watermark images
par: Mohammed, Ghassan Nashat
Publié: (2015)
par: Mohammed, Ghassan Nashat
Publié: (2015)
A study on participatory management and conservation of mangrove ecosystem in Matang and Carey Island, Malaysia / Mehdi Almasi
par: Mehdi , Almasi
Publié: (2018)
par: Mehdi , Almasi
Publié: (2018)
Development and application of a dynamic conflict resolution method for integrated water resources management / Mehdi Zomorodian
par: Mehdi , Zomorodian
Publié: (2018)
par: Mehdi , Zomorodian
Publié: (2018)
Blockchain-enabled cybersecurity framework for healthcare domain
par: Islam, Md Shohidul
Publié: (2025)
par: Islam, Md Shohidul
Publié: (2025)
Optimization of medical image steganography using n-decomposition genetic algorithm
par: Al-Sarayefi, Bushra Abdullah Shtayt
Publié: (2023)
par: Al-Sarayefi, Bushra Abdullah Shtayt
Publié: (2023)
Energy performance and cost analysis of phase change materials with different melting temperature in heating systems / Mehdi Rezaei
par: Mehdi , Rezaei
Publié: (2012)
par: Mehdi , Rezaei
Publié: (2012)
Metabelian groups of order at most 24
par: Abdul Rahman, Siti Fatimah
Publié: (2010)
par: Abdul Rahman, Siti Fatimah
Publié: (2010)
International Parities and Business Cycle Synchronization in the Asia Pacific Region
par: Chan, Tze Haw
Publié: (2009)
par: Chan, Tze Haw
Publié: (2009)
Documents similaires
-
Bit inverting map method for improved steganography scheme
par: Fadhil, Ammar Mohammedali
Publié: (2016) -
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
par: Ali , Hussain
Publié: (2021) -
MP3 audio steganography technique using extended least significant bit
par: Mohammed Atoum, Mohammed Salem
Publié: (2014) -
DCT domain Stegasvm-shifted LSB model for highly
imperceptible and robust cover-image / Hanizan Shaker Hussain
par: Shaker Hussain, Hanizan
Publié: (2014) -
A microservice-based architecture for an online product review analysis system / Mehdi Mohammadi
par: Mehdi , Mohammadi
Publié: (2021)