-
1
-
-
74349117323
-
A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
-
Ahmed, M.A., M.L.M. Kiah, B.B. Zaidan and A.A. Zaidan, 2010. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Applied Sci., 10: 59-64.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 59-64
-
-
Ahmed, M.A.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
-
2
-
-
77649155870
-
Arabic text steganography using kashida extensions with huffman code
-
Al-Azawi, A.F. and M.A. Fadhil, 2010. Arabic text steganography using kashida extensions with huffman code. J. Applied Sci., 10: 436-439.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 436-439
-
-
Al-Azawi, A.F.1
Fadhil, M.A.2
-
3
-
-
77954579339
-
Data hiding in video
-
Bhaumik, A.K., M. Choi, R.J. Robles and M.O. Balitanas, 2009. Data hiding in video. Int. J. Database Theory Appl.,2: 9-16.
-
(2009)
Int. J. Database Theory Appl.
, vol.2
, pp. 9-16
-
-
Bhaumik, A.K.1
Choi, M.2
Robles, R.J.3
Balitanas, M.O.4
-
5
-
-
0036497685
-
A steganographic method based upon JPEG and quantization table modification
-
Chang, C.C., T.S. Chen and L.Z. Chung, 2002. A steganographic method based upon JPEG and quantization table modification. Inform. Sci., 141: 123-138.
-
(2002)
Inform. Sci.
, vol.141
, pp. 123-138
-
-
Chang, C.C.1
Chen, T.S.2
Chung, L.Z.3
-
6
-
-
84874657797
-
-
Electrical and Computer Engineering Department, University of Ottawa
-
De Oliveira, J., 1997. A Java H. 263 decoder implementation. Electrical and Computer Engineering Department, University of Ottawa, http://www.lncc.br/~jauvane/papers/H263JavaDecoder.pdf.
-
(1997)
A Java H. 263 Decoder Implementation
-
-
de Oliveira, J.1
-
7
-
-
4744367575
-
Security pitfalls of frame by frame approaches to video watermarking
-
Doerr, G. and J. Dugelay, 2004. Security pitfalls of frame by frame approaches to video watermarking. IEEE Trans. Signal Proc, 52: 2955-2964.
-
(2004)
IEEE Trans. Signal Proc.
, vol.52
, pp. 2955-2964
-
-
Doerr, G.1
Dugelay, J.2
-
8
-
-
70349481986
-
High rate video streaming steganography
-
April 03-05, IEEE Computer Society, Kuala Lumpur, Malaysia
-
Eltahir, M.E., M.L.M. Kiah, B.B. Zaidan and A.A. Zaidan, 2009. High rate video streaming steganography. Proceedings of the 2009 International Conference on Future Computer and Communication, April 03-05, IEEE Computer Society, Kuala Lumpur, Malaysia, pp: 550-553.
-
(2009)
Proceedings of the 2009 International Conference on Future Computer and Communication
, pp. 550-553
-
-
Eltahir, M.E.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
-
9
-
-
77954808157
-
Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation
-
Jalab, H., A. Zaidan and B.B. Zaidan, 2009. Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation. J. Comput, 1: 108-113.
-
(2009)
J. Comput.
, vol.1
, pp. 108-113
-
-
Jalab, H.1
Zaidan, A.2
Zaidan, B.B.3
-
10
-
-
84957728214
-
Steganalysis: The investigation of hidden information
-
Sept. 1 -3, New York, USA
-
Johnson, N.F. and S. Jajodia, 1998. Steganalysis: The investigation of hidden information. Proceedings of IEEE Information Technology Conference, Sept. 1 -3, New York, USA., pp: 113-116.
-
(1998)
Proceedings of IEEE Information Technology Conference
, pp. 113-116
-
-
Johnson, N.F.1
Jajodia, S.2
-
11
-
-
0032634270
-
Principle and applications of BPCS-steganography
-
Kawaguchi, E. and R.O. Eason, 1998. Principle and applications of BPCS-steganography. Proc. SPIE, 3528: 464-473.
-
(1998)
Proc. SPIE
, vol.3528
, pp. 464-473
-
-
Kawaguchi, E.1
Eason, R.O.2
-
13
-
-
77954774232
-
Novel approach for high secure and high rate data hidden in the image using image texture analysis
-
Majeed, A., M.L.M. Kiah, H.T. Madhloom, B.B. Zaidan and A.A. Zaidan, 2009. Novel approach for high secure and high rate data hidden in the image using image texture analysis. Int. J. Eng. Technol., 1: 63-69.
-
(2009)
Int. J. Eng. Technol.
, vol.1
, pp. 63-69
-
-
Majeed, A.1
Kiah, M.L.M.2
Madhloom, H.T.3
Zaidan, B.B.4
Zaidan, A.A.5
-
14
-
-
0034593277
-
Anew paradigm hidden in steganography
-
Sept. 12-22, ACM, Ballycotton, County Cork, Ireland, New York
-
Moskowitz, I.S., G.E. Longdon and L. Chang, 2000. Anew paradigm hidden in steganography. Proceedings of the 2000 Workshop on New Security Paradigms, Sept. 12-22, ACM, Ballycotton, County Cork, Ireland, New York, pp: 41-50.
-
(2000)
Proceedings of the 2000 Workshop on New Security Paradigms
, pp. 41-50
-
-
Moskowitz, I.S.1
Longdon, G.E.2
Chang, L.3
-
15
-
-
77952268534
-
Challenges of hidden data in the unused area two within executable files
-
Naji, A.W., A.A. Zaidan and B.B. Zaidan, 2009. Challenges of hidden data in the unused area two within executable files. J. Comput. Sci., 5: 890-897.
-
(2009)
J. Comput. Sci.
, vol.5
, pp. 890-897
-
-
Naji, A.W.1
Zaidan, A.A.2
Zaidan, B.B.3
-
16
-
-
20444498265
-
Application of BPCS steganography to wavelet compressed video
-
Noda, H., T. Furuta, M. Niimi and E. Kawaguchi, 2004. Application of BPCS steganography to wavelet compressed video. Proc. Int. Conf. Image Process., 4: 2147-2150.
-
(2004)
Proc. Int. Conf. Image Process
, vol.4
, pp. 2147-2150
-
-
Noda, H.1
Furuta, T.2
Niimi, M.3
Kawaguchi, E.4
-
18
-
-
34249335008
-
A new method for real-time steganography
-
Shirali-Shahriza, M., 2006. A new method for real-time steganography. Int. Conf. Signal Proc, 4: 16-20.
-
(2006)
Int. Conf. Signal Proc
, vol.4
, pp. 16-20
-
-
Shirali-Shahriza, M.1
-
19
-
-
67649610454
-
High capacity persian/arabic text steganography
-
Shirah-Shahreza, M. and S. Shirali-Shahreza, 2008. High capacity persian/arabic text steganography. J. Applied Sci., 8: 4173-4179.
-
(2008)
J. Applied Sci.
, vol.8
, pp. 4173-4179
-
-
Shirah-Shahreza, M.1
Shirali-Shahreza, S.2
-
20
-
-
36148986025
-
New approaches to encryption and steganography for digital videos
-
Socek, D., H. Kalva, S.S. Magliveras, O. Marques, D. Culibrk and B. Furht, 2007. New approaches to encryption and steganography for digital videos. Multimed. Syst, 13: 191-204.
-
(2007)
Multimed. Syst
, vol.13
, pp. 191-204
-
-
Socek, D.1
Kalva, H.2
Magliveras, S.S.3
Marques, O.4
Culibrk, D.5
Furht, B.6
-
21
-
-
51849094549
-
A new video steganalysis based on mode detection
-
July 7-9, Shanghai
-
Su, Y., C. Zhang, L. Wang and C. Zhang, 2008. A new video steganalysis based on mode detection. Proceedings of the International Conference on Audio, Language and Image Processing, July 7-9, Shanghai, pp: 1507-1510.
-
(2008)
Proceedings of the International Conference on Audio, Language and Image Processing
, pp. 1507-1510
-
-
Su, Y.1
Zhang, C.2
Wang, L.3
Zhang, C.4
-
24
-
-
0038156469
-
Data hiding in image and video: Part II-designs and applications
-
Wu, M., H. Yu and B. Liu, 2003. Data hiding in image and video: Part II-designs and applications. IEEE Trans. Image Process., 12: 696-705.
-
(2003)
IEEE Trans. Image Process
, vol.12
, pp. 696-705
-
-
Wu, M.1
Yu, H.2
Liu, B.3
-
25
-
-
70349546940
-
-
Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia
-
Zaidan, B.B., A.A. Zaidan and F. Othman, 2008. Enhancement of the amount of hidden data and the quality of image. Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia.
-
(2008)
Enhancement of the Amount of Hidden Data and the Quality of Image
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Othman, F.3
-
26
-
-
77954780065
-
Novel approach for high secure data hidden in MPEG video using public key infrastructure
-
Network Security
-
Zaidan, A. and B. Zaidan, 2009. Novel approach for high secure data hidden in MPEG video using public key infrastructure. Int. J. Comput. Network Security, 1: 1985-1993.
-
(2009)
Int. J. Comput.
, vol.1
, pp. 1985-1993
-
-
Zaidan, A.1
Zaidan, B.2
-
27
-
-
77958609979
-
New technique of hidden data in pe-file with in unused area one
-
Zaidan, A., B. Zaidan and F. Othman, 2009. New technique of hidden data in pe-file with in unused area one. Int. J. Comput. Electrical Eng., 1: 1793-8198.
-
(2009)
Int. J. Comput. Electrical Eng.
, vol.1
, pp. 1793-8198
-
-
Zaidan, A.1
Zaidan, B.2
Othman, F.3
|