Show simple item record

dc.contributor.authorNagham Hamed, Abdul-Mahd
dc.contributor.authorYahya, Alsabahi
dc.contributor.authorR. Badlishah, Ahmad, Prof. Dr.
dc.contributor.authorAl-Qershi, Osamah M.
dc.date.accessioned2013-12-19T12:44:17Z
dc.date.available2013-12-19T12:44:17Z
dc.date.issued2012-11-20
dc.identifier.citationp. 553-560en_US
dc.identifier.urihttp://dspace.unimap.edu.my/123456789/30622
dc.descriptionMalaysian Technical Universities Conference on Engineering and Technology (MUCET) 2012 organised by technical universities under the Malaysian Technical Universities Network (MTUN), 20th - 21st November 2012 at Hotel Seri Malaysia, Kangar, Perlis.en_US
dc.description.abstractThe sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have exerted much of their time and efforts in an attempt to find suitable ways for data hiding. As a case in point is the development of steganography, a technique used for hiding the important information imperceptibly. As far as the present work is concerned, the researcher adopts the steganography system for the purpose of embedding secret data within the frequency domain. Such a step can be done by modifying the DCT coefficients in a content-based manner, so that the embedding map will be able to easily identify the embedding blocks; a matter which in turn helps recover the data hidden in the frequency domain. The arrived at results reflected the manageability of the system to fight against AWGN and JPEG compression attacks and a high quality stego-images. However, being only part of an image is used for the purpose of hiding data has limited the capacity of the system in this regards.en_US
dc.language.isoenen_US
dc.publisherMalaysian Technical Universities Network (MTUN)en_US
dc.relation.ispartofseriesProceedings of the Malaysian Technical Universities Conference on Engineering and Technology (MUCET) 2012;
dc.subjectDiscreet Wavelet Transformation (DWT)en_US
dc.subjectDiscrete Cosine Transformation (DCT)en_US
dc.subjectDigital worken_US
dc.titleSecured and robust information hiding schemeen_US
dc.typeWorking Paperen_US
dc.contributor.urlosamahqershi.lm07@student.usm.myen_US
dc.contributor.urlbadli@unimap.edu.myen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record