Steganography for securing image data using hybrid SLT and DCT
This study proposes a hybrid technique in securing image data that will be applied in telemedicine in future. Based on the web-based ENT diagnosis system using Virtual Hospital Server (VHS), patients are able to submit their physiological signals and multimedia data through the internet. In telemed...
| Main Author: | Rachmawanto, Eko Hari |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/28232/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=77731 |
| Abstract | Abstract here |
Similar Items
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014)
by: Ahmed, Zamzam Hohamed
Published: (2014)
Secure unlinkability schemes for privacy preserving data publishing in weighted social networks / Chong Kah Meng
by: Chong , Kah Meng
Published: (2020)
by: Chong , Kah Meng
Published: (2020)
An improved rdwt-based image steganography scheme using qr decomposition and human visual system
by: Ng, Ke Huey
Published: (2021)
by: Ng, Ke Huey
Published: (2021)
Open data framework for MTUN academics using open data license as mediator
by: Ismael, Siti Nur' Asyiqin
Published: (2022)
by: Ismael, Siti Nur' Asyiqin
Published: (2022)
An empirical study of the information security awareness model in Oman
by: Al Shanfari, Issam Shaaban Moshaded
Published: (2023)
by: Al Shanfari, Issam Shaaban Moshaded
Published: (2023)
Automated Deform Detection For Automotive Body Panels Using Image Processing Techniques
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
Enhancing the security of high payload image steganography using chaos
by: Rezza Moieni
Published: (2025)
by: Rezza Moieni
Published: (2025)
An enhanced metaheuristic approach to solve quadratic assignment problem using hybrid technique
by: Hameed, Asaad Shakir
Published: (2021)
by: Hameed, Asaad Shakir
Published: (2021)
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
by: Fatin Nabila , Abd Latiff
Published: (2021)
by: Fatin Nabila , Abd Latiff
Published: (2021)
Information quality structure framework in developing an information security management system (ISMS)
by: Palaniappan, P Siva Shamala
Published: (2017)
by: Palaniappan, P Siva Shamala
Published: (2017)
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
by: Mustafa, Nuridawati
Published: (2020)
by: Mustafa, Nuridawati
Published: (2020)
A model of artificial intelligence in cyber security of scada to enhance public safety in UAE
by: Alhashmi, Omar
Published: (2023)
by: Alhashmi, Omar
Published: (2023)
Integrated framework on decentralized E-Government in Iraqi higher education using hybrid approach
by: Fuaad Ali, Ali
Published: (2025)
by: Fuaad Ali, Ali
Published: (2025)
A new human-centric model of airport smart security system to enhance the passenger experience
by: Almarri, Ghalib Abdulla
Published: (2021)
by: Almarri, Ghalib Abdulla
Published: (2021)
Hybridization Of Deterministic And Metaheuristic Approaches In Global Optimization
by: Goh, Khang Wen
Published: (2019)
by: Goh, Khang Wen
Published: (2019)
Big data technology information extraction and fusion from non-homogenous web data sources
by: Lee, Qi Zian
Published: (2025)
by: Lee, Qi Zian
Published: (2025)
Duplicates detection approach within incomplete data sets using dynamic sorting key and hot deck compensation method
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)
by: Abdulrahim, Abdulrazzak Ali Mohamed
Published: (2022)
Modeling loss data with composite models / Mastoureh Maghsoudi
by: Mastoureh , Maghsoudi
Published: (2016)
by: Mastoureh , Maghsoudi
Published: (2016)
Outlier detection in cylindrical data / Nurul Hidayah Sadikon
by: Nurul Hidayah , Sadikon
Published: (2018)
by: Nurul Hidayah , Sadikon
Published: (2018)
Software defect prediction framework based on hybrid metaheuristic optimization methods
by: Wahono, Romi Satria
Published: (2015)
by: Wahono, Romi Satria
Published: (2015)
Optimizing lossless compression by normalized data length in Huffman Algorithm
by: Tonny, Hidayat
Published: (2022)
by: Tonny, Hidayat
Published: (2022)
Maritime transportation system, economy distribution and seaport network efficiency using fuzzy data envelopment analysis with clustering approach / Dineswary Nadarajan
by: Dineswary , Nadarajan
Published: (2023)
by: Dineswary , Nadarajan
Published: (2023)
Some problems of outliers in circular data / Ali H.M. Abuzaid
by: Abuzaid, Ali H.M.
Published: (2010)
by: Abuzaid, Ali H.M.
Published: (2010)
Convective boundary layer flow and heat transfer of williamson hybrid ferrofluid with various effects
by: Wan Muhammad Hilmi, Wan Rosli
Published: (2024)
by: Wan Muhammad Hilmi, Wan Rosli
Published: (2024)
Hybrid neural network in medicolegal degree of injury determination based on Visum et Repertum
by: Wardhana, Mohammad Hadyan
Published: (2023)
by: Wardhana, Mohammad Hadyan
Published: (2023)
JPEG image classification via DCT coefficient analysis for data carving and bulk image
by: Nadeem N.I. Alherbawi (P61109)
Published: (2023)
by: Nadeem N.I. Alherbawi (P61109)
Published: (2023)
Bayesian approach to errors-in-variables in count data regression models / Nur Aainaa Rozliman
by: Nur Aainaa , Rozliman
Published: (2018)
by: Nur Aainaa , Rozliman
Published: (2018)
Hybrid genetic algorithm with multi-parents recombination for job shop scheduling problems / Ong Chung Sin
by: Ong, Chung Sin
Published: (2013)
by: Ong, Chung Sin
Published: (2013)
An enhanced robust association rules method for missing values imputation in Arabic language data set
by: Salem, Awsan Thabet
Published: (2023)
by: Salem, Awsan Thabet
Published: (2023)
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
by: Ong, Phaik Ling
Published: (2016)
by: Ong, Phaik Ling
Published: (2016)
Hybrid fuzzy analytical hierarchy process with fuzzy inference system on ranking stem approach towards blended learning in mathematics
by: Durrani Aimi, Abdul Malik
Published: (2022)
by: Durrani Aimi, Abdul Malik
Published: (2022)
Optimised hybrid deep learning models for integrated energy modelling and anomaly detection under IPMVP compliance
by: Sukarti, Suziee
Published: (2025)
by: Sukarti, Suziee
Published: (2025)
A comparative study on improvement of image compression method using hybrid of DCT and DWT techniques with huffman encoding
by: Anwar Hussin, Mumtaz
Published: (2021)
by: Anwar Hussin, Mumtaz
Published: (2021)
Steganography For Embedding Data In Digital Image
by: Sowan, Salah Ibrahem
Published: (2003)
by: Sowan, Salah Ibrahem
Published: (2003)
Optimization of medical image steganography using n-decomposition genetic algorithm
by: Al-Sarayefi, Bushra Abdullah Shtayt
Published: (2023)
by: Al-Sarayefi, Bushra Abdullah Shtayt
Published: (2023)
Malware Removal Tools Using Indicators Of Compromise (IOCs)
by: Shahrin, Abdullah Azam
Published: (2017)
by: Shahrin, Abdullah Azam
Published: (2017)
A multi layer security method for image and key steganography
by: Samar Kamil Khudhair (P88051)
Published: (2023)
by: Samar Kamil Khudhair (P88051)
Published: (2023)
Analysis Of Continuous And Discrete Control Systems Using PID Controller
by: Khalaf, Aswaq Abdulameer
Published: (2016)
by: Khalaf, Aswaq Abdulameer
Published: (2016)
Development of dance movement model using Laban movement analysis
by: Sutopo, Joko
Published: (2023)
by: Sutopo, Joko
Published: (2023)
Insider threats detection model for email content using statistical analysis
by: Mohammad, Nur Ameera Natasha
Published: (2022)
by: Mohammad, Nur Ameera Natasha
Published: (2022)
Similar Items
-
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014) -
Secure unlinkability schemes for privacy preserving data publishing in weighted social networks / Chong Kah Meng
by: Chong , Kah Meng
Published: (2020) -
An improved rdwt-based image steganography scheme using qr decomposition and human visual system
by: Ng, Ke Huey
Published: (2021) -
Open data framework for MTUN academics using open data license as mediator
by: Ismael, Siti Nur' Asyiqin
Published: (2022) -
An empirical study of the information security awareness model in Oman
by: Al Shanfari, Issam Shaaban Moshaded
Published: (2023)
