An improved rdwt-based image steganography scheme using qr decomposition and human visual system
Recent years have seen a rising trend in the use of intensive transmission of information via the internet. Data protection has become a fairly important issue due to the fast progress of information and communication technology and the huge increase in internet usage by sending and receiving data....
| Auteur principal: | Ng, Ke Huey |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2021
|
| Sujets: | |
| Accès en ligne: | http://umpir.ump.edu.my/id/eprint/37638/1/ir.An%20improved%20rdwt-based%20image%20steganography%20scheme%20using%20qr%20decomposition%20and%20human%20visual%20system.pdf |
Documents similaires
Triple scheme based on image steganography to improve imperceptibility and security
par: Hashim, Mohammed Mahdi
Publié: (2022)
par: Hashim, Mohammed Mahdi
Publié: (2022)
An improved image steganography scheme based on distinction grade value and secret message encryption
par: Taha, Mustafa Sabah
Publié: (2020)
par: Taha, Mustafa Sabah
Publié: (2020)
Bit inverting map method for improved steganography scheme
par: Fadhil, Ammar Mohammedali
Publié: (2016)
par: Fadhil, Ammar Mohammedali
Publié: (2016)
Optimization of medical image steganography using n-decomposition genetic algorithm
par: Al-Sarayefi, Bushra Abdullah Shtayt
Publié: (2023)
par: Al-Sarayefi, Bushra Abdullah Shtayt
Publié: (2023)
Multi-classifire scheme for adult image classification with low-level visual features
par: Bozorgi, Mohammadmehdi
Publié: (2011)
par: Bozorgi, Mohammadmehdi
Publié: (2011)
Prototype development of VOIP steganography
par: Al-Othmani, Abdulaleem Zaid Mohammed
Publié: (2009)
par: Al-Othmani, Abdulaleem Zaid Mohammed
Publié: (2009)
Using RGB colour combination in coloured quick response (QR) code algorithm to enhance QR code capacity
par: Azizi, Abas
Publié: (2018)
par: Azizi, Abas
Publié: (2018)
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
par: Mehdi , Hussain
Publié: (2017)
par: Mehdi , Hussain
Publié: (2017)
Improved image compression scheme using hybrid of discrete fourier, wavelets and cosine transformation
par: Alsayyh, Moh’Dali Moustafa
Publié: (2015)
par: Alsayyh, Moh’Dali Moustafa
Publié: (2015)
An improved scaling factor for robust digital image watermarking scheme using DWT and SVD
par: Noor Saaid, Nur Afeza Ajirah
Publié: (2017)
par: Noor Saaid, Nur Afeza Ajirah
Publié: (2017)
Genetic based substitution techniques for audio steganography
par: Zamani, Mazdak
Publié: (2010)
par: Zamani, Mazdak
Publié: (2010)
Steganography based on utilizing more surrounding pixels
par: Afrakhteh, Masoud
Publié: (2010)
par: Afrakhteh, Masoud
Publié: (2010)
Performance analysis of steganography algorithms based for JPEG Images
par: Rosmmani, Areej Abdulmalik
Publié: (2012)
par: Rosmmani, Areej Abdulmalik
Publié: (2012)
Enhanced image encryption scheme with new mapreduce approach for big size images
par: Al-Khasawneh, Mahmoud Ahmad Salem
Publié: (2018)
par: Al-Khasawneh, Mahmoud Ahmad Salem
Publié: (2018)
MP3 audio steganography technique using extended least significant bit
par: Mohammed Atoum, Mohammed Salem
Publié: (2014)
par: Mohammed Atoum, Mohammed Salem
Publié: (2014)
Pixel-based dispersal scheme for medical image survivability and confidentiality
par: Nelmiawati, Nelmiawati
Publié: (2014)
par: Nelmiawati, Nelmiawati
Publié: (2014)
Secured email using steganography / Syaiful Annuar Omar
par: Syaiful Annuar, Omar
Publié: (2005)
par: Syaiful Annuar, Omar
Publié: (2005)
Improved pattern extraction scheme for clustering multidimensional data
par: Musdholifah, Aina
Publié: (2013)
par: Musdholifah, Aina
Publié: (2013)
An improved multiple classifier combination scheme for pattern classification
par: Abdullah, ,
Publié: (2015)
par: Abdullah, ,
Publié: (2015)
QR Decomposition For Adaptive Filtering
Application
par: Okwonu, Friday Zinzendoff
Publié: (2011)
par: Okwonu, Friday Zinzendoff
Publié: (2011)
Fusion scheme of segmentation and classification for breast cancer static ultrasound images
par: Zeebaree, Diyar Qader Saleem
Publié: (2020)
par: Zeebaree, Diyar Qader Saleem
Publié: (2020)
A new steganography technique using knight’s tour algorithm, affine cipher and huffman coding
par: Mohsin, Alla Talib
Publié: (2013)
par: Mohsin, Alla Talib
Publié: (2013)
Steganography in GIF animated grayscale images
par: Yerlan, Massalin
Publié: (2013)
par: Yerlan, Massalin
Publié: (2013)
An improved resource allocation scheme for WiMAX using channel information
par: Awan, Khalid Mahmood
Publié: (2014)
par: Awan, Khalid Mahmood
Publié: (2014)
Graphics processing unit based parallel copy move image forgery detection scheme
par: Zulkurnain, Ahmad Uways
Publié: (2015)
par: Zulkurnain, Ahmad Uways
Publié: (2015)
Watermarking scheme using slantlet transform and enhanced knight tour algorithm for medical images
par: Tan, Chi Wee
Publié: (2018)
par: Tan, Chi Wee
Publié: (2018)
Image splicing detection scheme using adaptive threshold mean ternary pattern descriptor
par: Abrahim, Araz Rajab
Publié: (2019)
par: Abrahim, Araz Rajab
Publié: (2019)
Steganography for securing image data using hybrid SLT and DCT
par: Rachmawanto, Eko Hari
Publié: (2012)
par: Rachmawanto, Eko Hari
Publié: (2012)
New human action recognition scheme with geometrical feature representation and invariant discretization for video surveillance
par: Amir Sjarif, Nilam Nur
Publié: (2015)
par: Amir Sjarif, Nilam Nur
Publié: (2015)
Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination
par: Jaafar, Sayuthi
Publié: (2013)
par: Jaafar, Sayuthi
Publié: (2013)
Fingerprint reconstruction based on improved directional image
par: Othman, Mohamad Kharulli
Publié: (2005)
par: Othman, Mohamad Kharulli
Publié: (2005)
Visual codebook analysis in image understanding / Hoo Wai Lam
par: Hoo, Wai Lam
Publié: (2015)
par: Hoo, Wai Lam
Publié: (2015)
Fusion-features and visual-dictionary image recognition methods for apple classification in smart manufacturing / Ahsiah Ismail
par: Ahsiah , Ismail
Publié: (2020)
par: Ahsiah , Ismail
Publié: (2020)
Improving information system security by evaluating human factors
par: Soltanmohammadi, Saeed
Publié: (2013)
par: Soltanmohammadi, Saeed
Publié: (2013)
Improved scheme of e-mail spam classification using meta-heuristics feature selection and support vector machine
par: Elssied Hamed, Nadir Omer Fadl
Publié: (2015)
par: Elssied Hamed, Nadir Omer Fadl
Publié: (2015)
Visual analysis of dense crowds / Kok Ven Jyn
par: Kok , Ven Jyn
Publié: (2016)
par: Kok , Ven Jyn
Publié: (2016)
Prototype development for embedding large amount of information using secure LSB and neural based steganography
par: Saleh, Basam N.
Publié: (2009)
par: Saleh, Basam N.
Publié: (2009)
Comparison and fusion of retrieval schemes based on different structures, similarity measures and weighting schemes
par: Wahlan, Mohammed Salem Farag
Publié: (2006)
par: Wahlan, Mohammed Salem Farag
Publié: (2006)
Flood Prediction Based On Deep Learning Networks With Variational Mode Decomposition
par: Ni, Chenmin
Publié: (2024)
par: Ni, Chenmin
Publié: (2024)
A gray-scale image steganography techmique using fibonacci 12-bitplane decomposition and LSB approach
par: Hamood, Sabah Fadhel
Publié: (2013)
par: Hamood, Sabah Fadhel
Publié: (2013)
Documents similaires
-
Triple scheme based on image steganography to improve imperceptibility and security
par: Hashim, Mohammed Mahdi
Publié: (2022) -
An improved image steganography scheme based on distinction grade value and secret message encryption
par: Taha, Mustafa Sabah
Publié: (2020) -
Bit inverting map method for improved steganography scheme
par: Fadhil, Ammar Mohammedali
Publié: (2016) -
Optimization of medical image steganography using n-decomposition genetic algorithm
par: Al-Sarayefi, Bushra Abdullah Shtayt
Publié: (2023) -
Multi-classifire scheme for adult image classification with low-level visual features
par: Bozorgi, Mohammadmehdi
Publié: (2011)