dc.contributor.author | Nagham Hamed, Abdul-Mahd | |
dc.contributor.author | Yahya, Alsabahi | |
dc.contributor.author | R. Badlishah, Ahmad, Prof. Dr. | |
dc.contributor.author | Al-Qershi, Osamah M. | |
dc.date.accessioned | 2013-12-19T12:44:17Z | |
dc.date.available | 2013-12-19T12:44:17Z | |
dc.date.issued | 2012-11-20 | |
dc.identifier.citation | p. 553-560 | en_US |
dc.identifier.uri | http://dspace.unimap.edu.my/123456789/30622 | |
dc.description | Malaysian Technical Universities Conference on Engineering and Technology (MUCET) 2012 organised by technical universities under the Malaysian Technical Universities Network (MTUN), 20th - 21st November 2012 at Hotel Seri Malaysia, Kangar, Perlis. | en_US |
dc.description.abstract | The sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have exerted much of their time and efforts in an attempt to find suitable ways for data hiding. As a case in point is the development of steganography, a technique used for hiding the important information imperceptibly. As far as the present work is concerned, the researcher adopts the steganography system for the purpose of embedding secret data within the frequency domain. Such a step can be done by modifying the DCT coefficients in a content-based manner, so that the embedding map will be able to easily identify the embedding blocks; a matter which in turn helps recover the data hidden in the frequency domain. The arrived at results reflected the manageability of the system to fight against AWGN and JPEG compression attacks and a high quality stego-images. However, being only part of an image is used for the purpose of hiding data has limited the capacity of the system in this regards. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Malaysian Technical Universities Network (MTUN) | en_US |
dc.relation.ispartofseries | Proceedings of the Malaysian Technical Universities Conference on Engineering and Technology (MUCET) 2012; | |
dc.subject | Discreet Wavelet Transformation (DWT) | en_US |
dc.subject | Discrete Cosine Transformation (DCT) | en_US |
dc.subject | Digital work | en_US |
dc.title | Secured and robust information hiding scheme | en_US |
dc.type | Working Paper | en_US |
dc.contributor.url | osamahqershi.lm07@student.usm.my | en_US |
dc.contributor.url | badli@unimap.edu.my | en_US |