Please use this identifier to cite or link to this item: http://dspace.unimap.edu.my:80/xmlui/handle/123456789/32210
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNagham Hamed, Abdul-Mahd-
dc.contributor.authorAbid, Yahya, Dr.-
dc.contributor.authorR. Badlishah, Ahmad, Prof. Dr.-
dc.contributor.authorOsamah M., Al-Qershi-
dc.date.accessioned2014-02-28T02:19:45Z-
dc.date.available2014-02-28T02:19:45Z-
dc.date.issued2013-
dc.identifier.citationProcedia Engineering, vol. 53, 2013, pages 463-471en_US
dc.identifier.issn1877-7058-
dc.identifier.issn978-162748634-7-
dc.identifier.issnhttp://www.sciencedirect.com/science/article/pii/S1877705813001793-
dc.identifier.urihttp://dspace.unimap.edu.my:80/dspace/handle/123456789/32210-
dc.descriptionLink to publisher's homepage at http://www.elsevier.com/en_US
dc.description.abstractThe sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have exerted much of their time and efforts in an attempt to find suitable ways for data hiding. As a case in point is the development of steganography, a technique used for hiding the important information imperceptibly. As far as the present work is concerned, the researcher adopts the steganography system for the purpose of embedding secret data within the frequency domain. Such a step can be done by modifying the DCT coefficients in a content-based manner, so that the embedding map will be able to easily identify the embedding blocks; a matter which in turn helps recover the data hidden in the frequency domain. The arrived at results reflected the manageability of the system to fight against AWGN and JPEG compression attacks and a high quality stego-images. However, being only part of an image is used for the purpose of hiding data has limited the capacity of the system in this regards.en_US
dc.language.isoenen_US
dc.publisherElsevier B.V.en_US
dc.subjectDiscreet Wavelet Transformation (DWT)en_US
dc.subjectDiscrete Cosine Transformation (DCT)en_US
dc.subjectDigital worken_US
dc.titleSecured and robust information hiding schemeen_US
dc.typeArticleen_US
dc.contributor.urlabid@unimap.edu.myen_US
dc.contributor.urlbadli@unimap.edu.myen_US
Appears in Collections:R. Badlishah Ahmad, Prof. Ir. Ts. Dr.
School of Computer and Communication Engineering (Articles)

Files in This Item:
File Description SizeFormat 
Secured and robust information hiding scheme.pdf9.76 kBAdobe PDFView/Open


Items in UniMAP Library Digital Repository are protected by copyright, with all rights reserved, unless otherwise indicated.