Please use this identifier to cite or link to this item: http://dspace.unimap.edu.my:80/xmlui/handle/123456789/29816
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNagham, Hamid-
dc.contributor.authorAbid, Yahya, Ir. Assoc. Prof. Dr.-
dc.contributor.authorR. Badlishah, Ahmad, Prof. Dr.-
dc.contributor.authorOsamah, M. Al- Qershi-
dc.date.accessioned2013-11-14T07:39:05Z-
dc.date.available2013-11-14T07:39:05Z-
dc.date.issued2012-06-18-
dc.identifier.citationp. 92 - 99en_US
dc.identifier.isbn978-967-5760-11-2-
dc.identifier.urihttp://dspace.unimap.edu.my/123456789/29816-
dc.descriptionThe 2nd International Malaysia-Ireland Joint Symposium on Engineering, Science and Business 2012 (IMiEJS2012) jointly organized by Universiti Malaysia Perlis and Athlone Institute of Technology in collaboration with The Ministry of Higher Education (MOHE) Malaysia, Education Malaysia and Malaysia Postgraduates Student Association Ireland (MyPSI), 18th - 19th June 2012 at Putra World Trade Center (PWTC), Kuala Lumpur, Malaysia.en_US
dc.description.abstractSteganography, which means “covered writing” in Greek, is the art and science of invisible communication. It is employed in various useful applications, e.g., copyright control of materials, companies‟ safe circulation of secret data, and in Medical Imaging Systems. Steganography can be achieved by hiding information in cover media. For most of the current steganography techniques, the information hiding process modifies almost all cover components. In this paper, a new method of steganography within digital images is presented. The method is a characteristic region based steganography using Speeded-Up Robust Features technique (SURF). The proposed technique embeds the binary secret message into the more robust characteristic regions in transform domain. Steganography synchronization is first achieved by the characteristic regions, which can be extracted using SURF technique, and then data embedding is achieved in a content based manner by modifying the wavelet transform coefficients. Experimental results show that the proposed algorithm allows hiding data invisibly with an accurate retrieval in the presence of lossy compression. In addition, the scheme is robust to noise interference.en_US
dc.language.isoenen_US
dc.publisherUniversiti Malaysia Perlis (UniMAP)en_US
dc.relation.ispartofseriesProceedings of the The 2nd International Malaysia-Ireland Joint Symposium on Engineering, Science and Business 2012 (IMiEJS2012);-
dc.subjectBlinden_US
dc.subjectImage Steganographyen_US
dc.subjectInformation hidingen_US
dc.subjectRobustnessen_US
dc.subjectSURFen_US
dc.titleBlind image Steganography scheme using speeded-up robust features techniqueen_US
dc.typeWorking Paperen_US
dc.contributor.urlnagham_fawa@yahoo.comen_US
dc.contributor.urlabidyahya@unimap.edu.myen_US
dc.contributor.urlbadli@unimap.edu.myen_US
Appears in Collections:Conference Papers
R. Badlishah Ahmad, Prof. Ir. Ts. Dr.

Files in This Item:
File Description SizeFormat 
pg 92 - 99.pdfAccess is limited to UniMAP community331.36 kBAdobe PDFView/Open


Items in UniMAP Library Digital Repository are protected by copyright, with all rights reserved, unless otherwise indicated.