The robust steganography technique based on location look-up table (LLUT)
Also available in printed version : QA76.9.A25 A238 2010 raf
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | |
| التنسيق: | Master's thesis |
| منشور في: |
Universiti Teknologi Malaysia
2025
|
| الموضوعات: | |
| الوصول للمادة أونلاين: | https://utmik.utm.my/handle/123456789/101652 |
| Abstract | Abstract here |
| _version_ | 1855605573524914176 |
|---|---|
| author | Abdulrashid Abba Ali |
| author2 | Azizah Bt Abdul Manaf, supervisor |
| author_facet | Azizah Bt Abdul Manaf, supervisor Abdulrashid Abba Ali |
| author_sort | Abdulrashid Abba Ali |
| description | Also available in printed version : QA76.9.A25 A238 2010 raf |
| format | Master's thesis |
| id | utm-123456789-101652 |
| institution | Universiti Teknologi Malaysia |
| publishDate | 2025 |
| publisher | Universiti Teknologi Malaysia |
| record_format | DSpace |
| record_pdf | Restricted |
| spelling | utm-123456789-1016522025-08-21T04:45:25Z The robust steganography technique based on location look-up table (LLUT) Abdulrashid Abba Ali Azizah Bt Abdul Manaf, supervisor Data encryption (Computer science) Information technology Also available in printed version : QA76.9.A25 A238 2010 raf With the recent development of internet as the fastest means of communication, data transmission is exposed to risk. However, steganography is one of the most important approaches to overcome this problem. Steganography is an art and science of hiding information, the desire to send a message safely and securely as possible. Location Look-Up Table (LLUT) is designed during the embedding process, where the original bit stream of the host image is compared with the bit stream of the watermarked image if the bit stream is same it stored the message location otherwise don?t stored the location. LLUT kept the embedded information as safely as possible to maintain the quality of host image. It is robust against any foam of attack and should be perceptually invisible to HVS (Human Visual system). LLUT is design to enhance the system?s capacity in hiding information. The efficient location lookup table is design using programming language codes (MATLAB). The result is evaluated with performance measurement of PSNR (Peak Signal to Noise Ratio) and SSIM (Structural Similarity Index Measure) which are measured for all the images before attack, after JPEG (Joint Photographic Experts Group), and Wiener filter attack. The calculated evaluated results shows that the PSNR before and after JPEG attack of all the images is above 30db and SSIM before and after JPEG attack are approaching 1. This implies that the images are robust to JPEG attack, but some images results in Wiener filter manifest lack of resistance to this attack. This result signifies that some images are perceptible and robust to the attack to some extent. sof UTM 174 p. Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010 2025-04-10T04:51:22Z 2025-04-10T04:51:22Z 2010 Master's thesis https://utmik.utm.my/handle/123456789/101652 valet-20151216-110332 vital:83014 Closed Access UTM Complete Unpublished application/pdf Universiti Teknologi Malaysia |
| spellingShingle | Data encryption (Computer science) Information technology Abdulrashid Abba Ali The robust steganography technique based on location look-up table (LLUT) |
| thesis_level | Master |
| title | The robust steganography technique based on location look-up table (LLUT) |
| title_full | The robust steganography technique based on location look-up table (LLUT) |
| title_fullStr | The robust steganography technique based on location look-up table (LLUT) |
| title_full_unstemmed | The robust steganography technique based on location look-up table (LLUT) |
| title_short | The robust steganography technique based on location look-up table (LLUT) |
| title_sort | robust steganography technique based on location look up table llut |
| topic | Data encryption (Computer science) Information technology |
| url | https://utmik.utm.my/handle/123456789/101652 |
| work_keys_str_mv | AT abdulrashidabbaali therobuststeganographytechniquebasedonlocationlookuptablellut AT abdulrashidabbaali robuststeganographytechniquebasedonlocationlookuptablellut |
