Search Results for Steganography - Narrowed by: EnglishSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dSteganography$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-05-22T00:54:45ZIntegrated researh in steganographyent://SD_ILS/0/SD_ILS:8371022024-05-22T00:54:45Z2024-05-22T00:54:45Zby Coon, Audrey, editor<br/>Author Coon, Audrey, editor<br/>Format: Books<br/>Call Number TK5102.94 I58 2015<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632403131<br/>Information hiding using steganographyent://SD_ILS/0/SD_ILS:3588442024-05-22T00:54:45Z2024-05-22T00:54:45Zby Muhalim Mohamed Amin<br/>Author Muhalim Mohamed Amin, Mazleena Salleh, Subariah Ibrahim, M. R. Katmin, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M83 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Steganography in GIF animated grayscale imagesent://SD_ILS/0/SD_ILS:8116692024-05-22T00:54:45Z2024-05-22T00:54:45Zby Massalin Yerlan, 1976-<br/>Author Massalin Yerlan, 1976-, Majid Bakhtiari, Dr., Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M379 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Steganography in GIF animated grayscale imagesent://SD_ILS/0/SD_ILS:8116702024-05-22T00:54:45Z2024-05-22T00:54:45Zby Massalin Yerlan, 1976-<br/>Author Massalin Yerlan, 1976-<br/>Format: Books<br/>Call Number CP 031190 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancing steganography capacity with modified LSBent://SD_ILS/0/SD_ILS:8378092024-05-22T00:54:45Z2024-05-22T00:54:45Zby Raja Mohamed Kamil Raja Zulkifli<br/>Author Raja Mohamed Kamil Raja Zulkifli, Shahidan Bin Abdullah, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A43 R353 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancing steganography capacity with modified LSBent://SD_ILS/0/SD_ILS:8378252024-05-22T00:54:45Z2024-05-22T00:54:45Zby Raja Mohamed Kamil Raja Zulkifli<br/>Author Raja Mohamed Kamil Raja Zulkifli<br/>Format: Books<br/>Call Number CP 034173 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Multimedia security : watermarking, steganography, and forensicsent://SD_ILS/0/SD_ILS:8109442024-05-22T00:54:45Z2024-05-22T00:54:45Zby Shih, Frank Y., editor<br/>Author Shih, Frank Y., editor<br/>Format: Books<br/>Call Number TK5105.15 M84 2012<br/>Publisher Taylor & Francis,<br/>Publication Date 2012<br/>ISBN 9781439873311<br/>Adaptive image steganography based on optimal embeddingent://SD_ILS/0/SD_ILS:7316942024-05-22T00:54:45Z2024-05-22T00:54:45Zby Omid Zanganeh, 1986-<br/>Author Omid Zanganeh, 1986-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TA1637 O45 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Adaptive image steganography based on optimal embeddingent://SD_ILS/0/SD_ILS:7317042024-05-22T00:54:45Z2024-05-22T00:54:45Zby Omid Zanganeh, 1986-<br/>Author Omid Zanganeh, 1986-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 023677 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Genetic based substitution techniques for audio steganographyent://SD_ILS/0/SD_ILS:7561922024-05-22T00:54:45Z2024-05-22T00:54:45Zby Mazdak Zamani, 1979-<br/>Author Mazdak Zamani, 1979-, Azizah Abdul Manaf, Rabiah Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M396 2010 raf<br/>Publication Date 2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Genetic based substitution techniques for audio steganographyent://SD_ILS/0/SD_ILS:7561942024-05-22T00:54:45Z2024-05-22T00:54:45Zby Mazdak Zamani, 1979-<br/>Author Mazdak Zamani, 1979-<br/>Format: Books<br/>Call Number CP 021720 ra<br/>Publication Date 2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Steganography based on utilizing more surrounding pixelsent://SD_ILS/0/SD_ILS:6034192024-05-22T00:54:45Z2024-05-22T00:54:45Zby Masoud Afrakhteh<br/>Author Masoud Afrakhteh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017368 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Steganography based on utilizing more surrounding pixelsent://SD_ILS/0/SD_ILS:3902572024-05-22T00:54:45Z2024-05-22T00:54:45Zby Masoud Afrakhteh<br/>Author Masoud Afrakhteh, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M378 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Disappearing cryptography : information hiding : steganography and watermarkingent://SD_ILS/0/SD_ILS:3350292024-05-22T00:54:45Z2024-05-22T00:54:45Zby Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number TK5105.59 W39 2009<br/>Edition 3rd ed.<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2009<br/>ISBN 9780123744791<br/>Digital watermarking and steganography : fundamentals and techniquesent://SD_ILS/0/SD_ILS:3375582024-05-22T00:54:45Z2024-05-22T00:54:45Zby Shih, Frank Y.<br/>Author Shih, Frank Y.<br/>Format: Books<br/>Call Number QA76.9.A25 S447 2008<br/>Publisher CRC Press,<br/>Publication Date 2007<br/>ISBN 9781420047578<br/>Steganography : random LSB insertion using discrete logarithment://SD_ILS/0/SD_ILS:3534482024-05-22T00:54:45Z2024-05-22T00:54:45Zby Muhalim Mohamed Amin<br/>Author Muhalim Mohamed Amin, Mazleena Salleh, Subariah Ibrahim, Mohd. Rozi Katmin, International Conference on Information Technology in Asia (3rd : 2003 : Kuching, Sarawak)<br/>Format: Books<br/>Call Number QA76.9.A25 S734 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Data hiding techniques in steganography using fibonacci sequence and knight tour algorithment://SD_ILS/0/SD_ILS:8564002024-05-22T00:54:45Z2024-05-22T00:54:45Zby Mohammed Abdullah Khalaf, 1978-<br/>Author Mohammed Abdullah Khalaf, 1978-, Nasrul Humaimi Mahmood, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number XX(856400.2)<br/>Publication Date 2016<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2016<br/>Image steganography using Least Significant Bit (LSB) and knight tour algorithment://SD_ILS/0/SD_ILS:8575982024-05-22T00:54:45Z2024-05-22T00:54:45Zby Soo, Ann Nie, 1993-<br/>Author Soo, Ann Nie, 1993-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 059563 ra<br/>Publication Date 2016<br/>Project Paper (Sarjana Muda Sains Komputer (Grafik dan Perisian Multimedia)) - Universiti Teknologi Malaysia, 2016<br/>Data hiding techniques in steganography using fibonacci sequence and knight tour algorithment://SD_ILS/0/SD_ILS:8564022024-05-22T00:54:45Z2024-05-22T00:54:45Zby Mohammed Abdullah Khalaf, 1978-<br/>Author Mohammed Abdullah Khalaf, 1978-, Nasrul Humaimi Mahmood, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number CP 059084 ra<br/>Publication Date 2016<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2016<br/>Image steganography using Least Significant Bit (LSB) and knight tour algorithment://SD_ILS/0/SD_ILS:8575972024-05-22T00:54:45Z2024-05-22T00:54:45Zby Soo, Ann Nie, 1993-<br/>Author Soo, Ann Nie, 1993-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number XX(857597.1)<br/>Publication Date 2016<br/>Project Paper (Sarjana Muda Sains Komputer (Grafik dan Perisian Multimedia)) - Universiti Teknologi Malaysia, 2016<br/>Enhancement of embedding capacity in GSM full rate encoded speech signal using pitch-dependent steganographyent://SD_ILS/0/SD_ILS:8635072024-05-22T00:54:45Z2024-05-22T00:54:45Zby Abdulaleem Zaid Mohammed Al-Othman, 1981-, author<br/>Author Abdulaleem Zaid Mohammed Al-Othman, 1981-, author, Azizah Abd. Manaf, supervisor, Akram M. Zeki Khedher, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(863507.2)<br/>Publication Date 2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>Bit inverting map method for improved steganography schemeent://SD_ILS/0/SD_ILS:8636262024-05-22T00:54:45Z2024-05-22T00:54:45Zby Ammar Mohammedali Fadhil, 1973-, author<br/>Author Ammar Mohammedali Fadhil, 1973-, author, Siti Mariyam Shamsuddin, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(863626.2)<br/>Publication Date 2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>Steganography in encoded audio using gaussian distribution on embedded modified discrete cosine transform coefficientsent://SD_ILS/0/SD_ILS:8651082024-05-22T00:54:45Z2024-05-22T00:54:45Zby Mohsen Bazyar, 1985- , author<br/>Author Mohsen Bazyar, 1985- , author, Rubita Sudirman, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number XX(865108.1)<br/>Publication Date 2016<br/>Thesis (Ph.D (Kejuruteraan Elektrik)) - Universiti Teknologi Malaysia, 2016<br/>Steganography in encoded audio using gaussian distribution on embedded modified discrete cosine transform coefficientsent://SD_ILS/0/SD_ILS:8678912024-05-22T00:54:45Z2024-05-22T00:54:45Zby Mohsen Bazyar, 1985- , author<br/>Author Mohsen Bazyar, 1985- , author<br/>Format: Books<br/>Call Number CP 064200 ra<br/>Publication Date 2016<br/>Thesis (Ph.D (Kejuruteraan Elektrik)) - Universiti Teknologi Malaysia, 2016<br/>Bit inverting map method for improved steganography schemeent://SD_ILS/0/SD_ILS:8685482024-05-22T00:54:45Z2024-05-22T00:54:45Zby Ammar Mohammedali Fadhil, 1973-, author<br/>Author Ammar Mohammedali Fadhil, 1973-, author<br/>Format: Electronic Resources<br/>Call Number CP 064716 ra<br/>Publication Date 2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>Enhancement of embedding capacity in GSM full rate encoded speech signal using pitch-dependent steganographyent://SD_ILS/0/SD_ILS:8684862024-05-22T00:54:45Z2024-05-22T00:54:45Zby Abdulaleem Zaid Mohammed Al-Othman, 1981-, author<br/>Author Abdulaleem Zaid Mohammed Al-Othman, 1981-, author<br/>Format: Electronic Resources<br/>Call Number CP 064626 ra<br/>Publication Date 2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>A new steganography technique using magic square matrix and affine chiperent://SD_ILS/0/SD_ILS:8506682024-05-22T00:54:45Z2024-05-22T00:54:45Zby Al-Hasan, Waleed S. Hasan, 1983-, author<br/>Author Al-Hasan, Waleed S. Hasan, 1983-, author, Muhammad Mun'im Ahmad Zabidi, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number Z104 A44 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/>A new steganography technique using magic square matrix and affine chiperent://SD_ILS/0/SD_ILS:8506702024-05-22T00:54:45Z2024-05-22T00:54:45Zby Al-Hasan, Waleed S. Hasan, 1983-, author<br/>Author Al-Hasan, Waleed S. Hasan, 1983-, author<br/>Format: Books<br/>Call Number CP 054419 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/>Colour image steganography using LSB insertion and ceasar cipherent://SD_ILS/0/SD_ILS:8603652024-05-22T00:54:45Z2024-05-22T00:54:45Zby Tan Sze Jia, 1991-, author<br/>Author Tan Sze Jia, 1991-, author, Ghazali Sulong, Prof. Dr., supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 061101 ra<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Kejuruteraan Perisian)) - Universiti Teknologi Malaysia, 2015<br/>Gray-scale image steganography using LSB insertion and fibonaccient://SD_ILS/0/SD_ILS:8603692024-05-22T00:54:45Z2024-05-22T00:54:45Zby Toh, Pui Ling, 1991-<br/>Author Toh, Pui Ling, 1991-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number TA1636 T64 2015raf<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Grafik dan Perisian Multimedia)) - Universiti Teknologi Malaysia, 2015<br/>Colour image steganography using LSB insertion and ceasar cipherent://SD_ILS/0/SD_ILS:8603262024-05-22T00:54:45Z2024-05-22T00:54:45Zby Tan Sze Jia, 1991-, author<br/>Author Tan Sze Jia, 1991-, author, Ghazali Sulong, Prof. Dr., supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number XX(860326.1)<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Kejuruteraan Perisian)) - Universiti Teknologi Malaysia, 2015<br/>Gray-scale image steganography using LSB insertion and fibonaccient://SD_ILS/0/SD_ILS:8603732024-05-22T00:54:45Z2024-05-22T00:54:45Zby Toh, Pui Ling, 1991-<br/>Author Toh, Pui Ling, 1991-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 061116 ra<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Grafik dan Perisian Multimedia)) - Universiti Teknologi Malaysia, 2015<br/>MP3 audio steganography technique using extended least significant bitent://SD_ILS/0/SD_ILS:8342722024-05-22T00:54:45Z2024-05-22T00:54:45Zby Mohammed Salem Mohammed Atoum, 1979- , author<br/>Author Mohammed Salem Mohammed Atoum, 1979- , author, Subariah Ibrahim, supervisor, Ghazali Sulong, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(834272.1)<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2014<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>Robust and highly secure graphical user authentication based on steganographyent://SD_ILS/0/SD_ILS:8349862024-05-22T00:54:45Z2024-05-22T00:54:45Zby Arash Habibi Lashkari, 1974- , author<br/>Author Arash Habibi Lashkari, 1974- , author, Azizah Abdul Manaf, supervisor, Maslin Masrom, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(834986.1)<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2014<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>A new colour image steganography using LSB approach with halftoning determination embedding positionent://SD_ILS/0/SD_ILS:8439832024-05-22T00:54:45Z2024-05-22T00:54:45Zby Reband Jamil Hassan, 1982- author<br/>Author Reband Jamil Hassan, 1982- author, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 R434 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>A new colour image steganography using LSB approach with halftoning determination embedding positionent://SD_ILS/0/SD_ILS:8439882024-05-22T00:54:45Z2024-05-22T00:54:45Zby Reband Jamil Hassan, 1982- author<br/>Author Reband Jamil Hassan, 1982- author, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 052326 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>Robust and highly secure graphical user authentication based on steganographyent://SD_ILS/0/SD_ILS:8478642024-05-22T00:54:45Z2024-05-22T00:54:45Zby Arash Habibi Lashkari, 1974- , author<br/>Author Arash Habibi Lashkari, 1974- , author<br/>Format: Books<br/>Call Number CP 053312 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2014<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>MP3 audio steganography technique using extended least significant bitent://SD_ILS/0/SD_ILS:8479112024-05-22T00:54:45Z2024-05-22T00:54:45Zby Mohammed Salem Mohammed Atoum, 1979- , author<br/>Author Mohammed Salem Mohammed Atoum, 1979- , author<br/>Format: Books<br/>Call Number CP 053355 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2014<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>Enhancing the security of high payload image steganography using chaosent://SD_ILS/0/SD_ILS:8037482024-05-22T00:54:45Z2024-05-22T00:54:45Zby Rezza Moieni, 1979-<br/>Author Rezza Moieni, 1979-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5102.94 R49<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancing the security of high payload image steganography using chaosent://SD_ILS/0/SD_ILS:8041482024-05-22T00:54:45Z2024-05-22T00:54:45Zby Rezza Moieni, 1979-<br/>Author Rezza Moieni, 1979-<br/>Format: Books<br/>Call Number CP 029976 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>A gray-scale image steganography techmique using fibonacci 12-bitplane decomposition and LSB approachent://SD_ILS/0/SD_ILS:8042882024-05-22T00:54:45Z2024-05-22T00:54:45Zby Sabah Fadhel Hamood, 1973-<br/>Author Sabah Fadhel Hamood, 1973-, Ghazali Sulong, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 S234 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian eliminationent://SD_ILS/0/SD_ILS:8061562024-05-22T00:54:45Z2024-05-22T00:54:45Zby Sayuthi Jaafar, 1962-<br/>Author Sayuthi Jaafar, 1962-<br/>Format: Books<br/>Call Number CP 030475 ra<br/>Publication Date 2013<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Grey scale image steganography using Exploiting Modification Direction (EMD) methodent://SD_ILS/0/SD_ILS:8075402024-05-22T00:54:45Z2024-05-22T00:54:45Zby Tan, Mei Lian, 1989-, author<br/>Author Tan, Mei Lian, 1989-, author, Ghazali Sulong, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 T368 2013 raf<br/>Publication Date 2013 2012<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafk Dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Grey scale image steganography using Exploiting Modification Direction (EMD) methodent://SD_ILS/0/SD_ILS:8075412024-05-22T00:54:45Z2024-05-22T00:54:45Zby Tan, Mei Lian, 1989-, author<br/>Author Tan, Mei Lian, 1989-, author<br/>Format: Books<br/>Call Number CP 082475 ra<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafk Dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Image steganography based on LSB approach coupled with Caesar Cipher and Huffman Codingent://SD_ILS/0/SD_ILS:8077232024-05-22T00:54:45Z2024-05-22T00:54:45Zby Low, Shu Lin, 1989-<br/>Author Low, Shu Lin, 1989-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 L69 2013 raf<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Image steganography based on LSB approach coupled with Caesar cipher and Huffman codingent://SD_ILS/0/SD_ILS:8077262024-05-22T00:54:45Z2024-05-22T00:54:45Zby Low, Shu Lin, 1989-<br/>Author Low, Shu Lin, 1989-<br/>Format: Books<br/>Call Number CP 032402 ra<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Color image steganography technique based onleast significant bits approach coupled with Huffman encoding compressionent://SD_ILS/0/SD_ILS:8078872024-05-22T00:54:45Z2024-05-22T00:54:45Zby Eng, Chia Jing, 1989-<br/>Author Eng, Chia Jing, 1989-<br/>Format: Books<br/>Call Number CP 030805 ra<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian eliminationent://SD_ILS/0/SD_ILS:8028172024-05-22T00:54:45Z2024-05-22T00:54:45Zby Sayuthi Jaafar, 1962- , author<br/>Author Sayuthi Jaafar, 1962- , author, Azizah Abd. Manaf, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 S29 2013 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>A gray-scale image steganography techmique using fibonacci 12-bitplane decomposition and LSB approachent://SD_ILS/0/SD_ILS:8044892024-05-22T00:54:45Z2024-05-22T00:54:45Zby Sabah Fadhel Hamood, 1973-<br/>Author Sabah Fadhel Hamood, 1973-<br/>Format: Books<br/>Call Number CP 030220 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Color image steganography technique based onleast significant bits approach coupled with Huffman encoding compressionent://SD_ILS/0/SD_ILS:8078852024-05-22T00:54:45Z2024-05-22T00:54:45Zby Eng, Chia Jing, 1989-<br/>Author Eng, Chia Jing, 1989-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5102.94 E54 2013 raf<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Covre optimization for image steganography by using image peaturesent://SD_ILS/0/SD_ILS:8115482024-05-22T00:54:45Z2024-05-22T00:54:45Zby Zaid Nidhal Khudhair, 1988-<br/>Author Zaid Nidhal Khudhair, 1988-, Dzulkifli Mohamad, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.15 Z35 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Covre optimization for image steganography by using image peaturesent://SD_ILS/0/SD_ILS:8115522024-05-22T00:54:45Z2024-05-22T00:54:45Zby Zaid Nidhal Khudhair, 1988-<br/>Author Zaid Nidhal Khudhair, 1988-<br/>Format: Books<br/>Call Number CP 031142 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>A new steganography technique using Knight's Tour algorithm, Affine Cipher and Huffman Codingent://SD_ILS/0/SD_ILS:8117442024-05-22T00:54:45Z2024-05-22T00:54:45Zby Alla Talib Mohsin, 1986-<br/>Author Alla Talib Mohsin, 1986-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A453 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>A new steganography technique using Knight's Tour algorithm, Affine Cipher and Huffman Codingent://SD_ILS/0/SD_ILS:8117462024-05-22T00:54:45Z2024-05-22T00:54:45Zby Alla Talib Mohsin, 1986-<br/>Author Alla Talib Mohsin, 1986-<br/>Format: Books<br/>Call Number CP 031153 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Least significant bit image steganography using particle swarm optimization and optical pixel adjustmentent://SD_ILS/0/SD_ILS:7902772024-05-22T00:54:45Z2024-05-22T00:54:45Zby Parisa Gerami, 1994-<br/>Author Parisa Gerami, 1994-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 P37 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) – Universiti Teknologi Malaysia, 2012<br/>Performance analysis of steganography algorithms based for JPEG Imagesent://SD_ILS/0/SD_ILS:7901562024-05-22T00:54:45Z2024-05-22T00:54:45Zby Areej Abdulmalik Rosmmani, 1985-<br/>Author Areej Abdulmalik Rosmmani, 1985-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A744 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) – Universiti Teknologi Malaysia, 2012<br/>Performance analysis of steganography algorithms based for JPEG Imagesent://SD_ILS/0/SD_ILS:7901572024-05-22T00:54:45Z2024-05-22T00:54:45Zby Areej Abdulmalik Rosmmani, 1985-<br/>Author Areej Abdulmalik Rosmmani, 1985-<br/>Format: Books<br/>Call Number CP 028331 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) – Universiti Teknologi Malaysia, 2012<br/>Least significant bit image steganography using particle swarm optimization and optical pixel adjustmentent://SD_ILS/0/SD_ILS:7902802024-05-22T00:54:45Z2024-05-22T00:54:45Zby Parisa Gerami, 1994-<br/>Author Parisa Gerami, 1994-<br/>Format: Books<br/>Call Number CP 027550 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) – Universiti Teknologi Malaysia, 2012<br/>Image steganography using least significant bit approach enhanced with compression and encryptionent://SD_ILS/0/SD_ILS:7932642024-05-22T00:54:45Z2024-05-22T00:54:45Zby Morteza Bashardoost, 1983-<br/>Author Morteza Bashardoost, 1983-, Ghazali Sulong, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M67 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Image steganography using least significant bit approach enhanced with compression and encryptionent://SD_ILS/0/SD_ILS:7932652024-05-22T00:54:45Z2024-05-22T00:54:45Zby Morteza Bashardoost, 1983-<br/>Author Morteza Bashardoost, 1983-<br/>Format: Books<br/>Call Number CP 028728 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Implementing image steganography using least significant bit in mobile deviceent://SD_ILS/0/SD_ILS:8405072024-05-22T00:54:45Z2024-05-22T00:54:45Zby Siti Dhalila Mohd Satar, 1986-<br/>Author Siti Dhalila Mohd Satar, 1986-, Azizah Abd. Manaf, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.884 S58 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Implementing image steganography using least significant bit in mobile deviceent://SD_ILS/0/SD_ILS:8405082024-05-22T00:54:45Z2024-05-22T00:54:45Zby Siti Dhalila Mohd Satar, 1986-<br/>Author Siti Dhalila Mohd Satar, 1986-, Azizah Abd. Manaf, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 033992 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Steganography in digital media : principles, algorithms, and applicationsent://SD_ILS/0/SD_ILS:7583262024-05-22T00:54:45Z2024-05-22T00:54:45Zby Fridrich, Jessica<br/>Author Fridrich, Jessica<br/>Format: Books<br/>Call Number QA76.9.A25 F75 2010<br/>Publisher Cambridge University Press,<br/>Publication Date 2010<br/>ISBN 9780521190190<br/>Image steganography system based on genetic algorithm in frequency domainent://SD_ILS/0/SD_ILS:8406132024-05-22T00:54:45Z2024-05-22T00:54:45Zby Moghaddasi, Zahra, 1984-<br/>Author Moghaddasi, Zahra, 1984-, Azizah Abd. Manaf, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5102.9 M644 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>The robust steganography technique based on location look-up table (LLUT)ent://SD_ILS/0/SD_ILS:8397562024-05-22T00:54:45Z2024-05-22T00:54:45Zby Abdulrashid Abba Ali<br/>Author Abdulrashid Abba Ali, Azizah Abdul Manaf, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A238 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>The robust steganography technique based on location look-up table (LLUT)ent://SD_ILS/0/SD_ILS:8397582024-05-22T00:54:45Z2024-05-22T00:54:45Zby Abdulrashid Abba Ali<br/>Author Abdulrashid Abba Ali<br/>Format: Books<br/>Call Number CP 034571 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Image steganography system based on genetic algorithm in frequency domainent://SD_ILS/0/SD_ILS:8406152024-05-22T00:54:45Z2024-05-22T00:54:45Zby Moghaddasi, Zahra, 1984-<br/>Author Moghaddasi, Zahra, 1984-, Azizah Abd. Manaf, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 033993 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>A genetic-algorithm-based approach for audio steganographyent://SD_ILS/0/SD_ILS:7818392024-05-22T00:54:45Z2024-05-22T00:54:45Zby Mazdak Zamani, 1979-, author<br/>Author Mazdak Zamani, 1979-, author, Azizah A. Manaf, author, Rabiah Ahmad, author, Akram M. Zeki, author, Shahidan Bin Abdullah, author<br/>Format: Books<br/>Call Number XX(781839.2)<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2009<br/>Prototype development for embedding large amount of information using secure LSB and neural based steganographyent://SD_ILS/0/SD_ILS:5905792024-05-22T00:54:45Z2024-05-22T00:54:45Zby Basam N. Saleh<br/>Author Basam N. Saleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017327 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>A secure and enhanced high embeding capacity steganography based on pixel indicator algorithment://SD_ILS/0/SD_ILS:6010992024-05-22T00:54:45Z2024-05-22T00:54:45Zby Fouziah Saleh Abdullah Aleidan, 1983-<br/>Author Fouziah Saleh Abdullah Aleidan, 1983-<br/>Format: Computer file<br/>Call Number CP 027139 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>An approach to improve the robustness of substitution techniques of audio steganographyent://SD_ILS/0/SD_ILS:3493772024-05-22T00:54:45Z2024-05-22T00:54:45Zby Mazdak Zamani, 1979-, author<br/>Author Mazdak Zamani, 1979-, author, Rabiah Ahmad, author, Azizah Abdul Manaf, author, Akram M. Zeki, author, IEEE International Conference on Computer Science and Information Technology (2nd : 2009 : Bejing , China)i<br/>Format: Books<br/>Call Number xx<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2009<br/>A secure and enhanced high embeding capacity steganography based on pixel indicator algorithment://SD_ILS/0/SD_ILS:3717932024-05-22T00:54:45Z2024-05-22T00:54:45Zby Fouziah Saleh Abdullah Aleidan, 1983-<br/>Author Fouziah Saleh Abdullah Aleidan, 1983-, Azizah Abdul Manaf, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 F68 2009 raf<br/>Publication Date 2009<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Prototype development for embedding large amount of information using secure LSB and neural based steganographyent://SD_ILS/0/SD_ILS:3225252024-05-22T00:54:45Z2024-05-22T00:54:45Zby Basam N. Saleh<br/>Author Basam N. Saleh, Azizah Abd. Manaf, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 B374 2009 raf<br/>Publication Date 2009<br/><a href="http://eprints.utm.my/9764">Full text thesis via UTM-IR</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Genetic algorithm as an approach to resolve the problems of substitution techniques of audio Steganographyent://SD_ILS/0/SD_ILS:7825082024-05-22T00:54:45Z2024-05-22T00:54:45Zby Mazdak Zamani, 1979-, author<br/>Author Mazdak Zamani, 1979-, author, Azizah A. Manaf, author, Rabiah Ahmad, author, Akram M. Zeki, author, Shahidan Abdullah, author<br/>Format: Books<br/>Call Number XX(782508.1) 1<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Secured audio file transfer system using steganography approachent://SD_ILS/0/SD_ILS:6159232024-05-22T00:54:45Z2024-05-22T00:54:45Zby Jaya Malini Perumal, author<br/>Author Jaya Malini Perumal, author, Fakulti Komputeran<br/>Format: Computer file<br/>Call Number CP 025462 ra<br/>Publication Date 2005<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/>Multimedia security : steganography and digital watermarking techniques for protection of intellectual propertyent://SD_ILS/0/SD_ILS:3944912024-05-22T00:54:45Z2024-05-22T00:54:45Zby Lu, Chun-Shien<br/>Author Lu, Chun-Shien<br/>Format: Books<br/>Call Number QA76.9.A25 M84 2005<br/>Publisher Idea Group Pub.,<br/>Publication Date 2005<br/>ISBN 9781591401926<br/>Secured audio file transfer system using steganography approachent://SD_ILS/0/SD_ILS:4631732024-05-22T00:54:45Z2024-05-22T00:54:45Zby Jaya Malini Perumal<br/>Author Jaya Malini Perumal, Mohd. Aizaini Maarof, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.5 J39 2005 raf<br/>Publication Date 2005<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/>ENHANCING KEY MANAGEMENT OF ZIGBEE NETWORK BY STEGANOGRAPHY METHODent://SD_ILS/0/SD_ILS:8407772024-05-22T00:54:45Z2024-05-22T00:54:45Zby Zavosh Abdollahzadeh Davani, 1989-, author<br/>Author Zavosh Abdollahzadeh Davani, 1989-, author, Azizah Abd. Manaf, Prof.Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A43 Z38 2013 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ENHANCING KEY MANAGEMENT OF ZIGBEE NETWORK BY STEGANOGRAPHY METHODent://SD_ILS/0/SD_ILS:8407782024-05-22T00:54:45Z2024-05-22T00:54:45Zby Zavosh Abdollahzadeh Davani, 1989-, author<br/>Author Zavosh Abdollahzadeh Davani, 1989-, author, Azizah Abd. Manaf, Prof.Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034041 ra<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ENHANCED SECURITY AUDIO STEGANOGRAPHY BY USING HIGHER LEAST SIGNIFICANT BITent://SD_ILS/0/SD_ILS:8593562024-05-22T00:54:45Z2024-05-22T00:54:45Zby Surenthiran Krishnan, 1984-, author<br/>Author Surenthiran Krishnan, 1984-, author, Mohd. Shahidan Abdullah, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.575 S87 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETSent://SD_ILS/0/SD_ILS:8605712024-05-22T00:54:45Z2024-05-22T00:54:45Zby Ahmad Shukri Samsuddin, 1982-, author<br/>Author Ahmad Shukri Samsuddin, 1982-, author, Azizah Abdul Manaf, Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HV8079.C65 A363 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>ENHANCED SECURITY AUDIO STEGANOGRAPHY BY USING HIGHER LEAST SIGNIFICANT BITent://SD_ILS/0/SD_ILS:8595662024-05-22T00:54:45Z2024-05-22T00:54:45Zby Surenthiran Krishnan, 1984-, author<br/>Author Surenthiran Krishnan, 1984-, author, Mohd. Shahidan Abdullah, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034729 ra<br/>Thesis (Msc)-Universiti Teknologi Malaysia, 2015<br/>NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETSent://SD_ILS/0/SD_ILS:8609202024-05-22T00:54:45Z2024-05-22T00:54:45Zby Ahmad Shukri Samsuddin, 1982-, author<br/>Author Ahmad Shukri Samsuddin, 1982-, author, Azizah Abdul Manaf, Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034808 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>EXTREME LEARNING MACHINE BASED CRYPTOGRAPHY AND STEGANOGRAPHY SYSTEMSent://SD_ILS/0/SD_ILS:8710052024-05-22T00:54:45Z2024-05-22T00:54:45Zby Hayfaa Abdulzahra Atee, 1967-, author<br/>Author Hayfaa Abdulzahra Atee, 1967-, author, Robiah Ahmad, Dr., supervisor, Norliza Mohd. Noor, Dr., supervisor, Abdul Monem S. Rahma, Dr., supervisor, Sekolah Razak UTM Dalam Kejuruteraan dan Teknologi Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 H395 2017 raf<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/>EXTREME LEARNING MACHINE BASED CRYPTOGRAPHY AND STEGANOGRAPHY SYSTEMSent://SD_ILS/0/SD_ILS:8722182024-05-22T00:54:45Z2024-05-22T00:54:45Zby Hayfaa Abdulzahra Atee, 1967-, author<br/>Author Hayfaa Abdulzahra Atee, 1967-, author, Robiah Ahmad, Dr., supervisor, Norliza Mohd. Noor, Dr., supervisor, Abdul Monem S. Rahma, Dr., supervisor, Sekolah Razak UTM Dalam Kejuruteraan dan Teknologi Termaju<br/>Format: Books<br/>Call Number CP 064099 ra<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/>Selective colour image encryption based on texture features using enhanced blowfish algorithment://SD_ILS/0/SD_ILS:8635052024-05-22T00:54:45Z2024-05-22T00:54:45Zby Lahieb Mohammed Jawad, 1978-, author<br/>Author Lahieb Mohammed Jawad, 1978-, author, Ghazali Sulong, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(863505.2)<br/>Publication Date 2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>Selective colour image encryption based on texture features using enhanced blowfish algorithment://SD_ILS/0/SD_ILS:8684842024-05-22T00:54:45Z2024-05-22T00:54:45Zby Lahieb Mohammed Jawad, 1978-, author<br/>Author Lahieb Mohammed Jawad, 1978-, author, Ghazali Sulong, supervisor, Fakulti Komputeran<br/>Format: Electronic Resources<br/>Call Number CP 064628 ra<br/>Publication Date 2016<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>The basics of digital forensics : the primer for getting started in digital forensicsent://SD_ILS/0/SD_ILS:8383682024-05-22T00:54:45Z2024-05-22T00:54:45Zby Sammons, John, author<br/>Author Sammons, John, author<br/>Format: Books<br/>Call Number HV8079.C65 S26 2015<br/>Edition Second edition<br/>Publisher Elsevier,<br/>Publication Date 2015<br/>ISBN 9780128016350<br/>Comparing image quality of different steganographic techniquesent://SD_ILS/0/SD_ILS:4435122024-05-22T00:54:45Z2024-05-22T00:54:45Zby Azizah Abdul Manaf<br/>Author Azizah Abdul Manaf, Akram Mohd. Zeki, Sayuthi Jaafar, Salehuddin A. Kadir, International Conference on Information Technology and Multimedia (2005 : UNITEN, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 C655 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Analysis of image quality for steganographic softwareent://SD_ILS/0/SD_ILS:4547702024-05-22T00:54:45Z2024-05-22T00:54:45Zby Azizah Abd. Manaf, Prof. Dr.<br/>Author Azizah Abd. Manaf, Prof. Dr., M. Z. Akram, K. Salehuddin, Sayuthi Jaafar, Brunei International Conference on Engineering and Technology (2005 : Brunei Darussalam)<br/>Format: Books<br/>Call Number QA76.9.A25 A53 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>