Search Results for Steganography - Narrowed by: Data protection - Computer networks -- Security measuresSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dSteganography$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection$002509Data$002bprotection$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ic$003dtrue$0026ps$003d300?dt=list2024-05-17T10:13:58ZInformation hiding using steganographyent://SD_ILS/0/SD_ILS:3588442024-05-17T10:13:58Z2024-05-17T10:13:58Zby Muhalim Mohamed Amin<br/>Author Muhalim Mohamed Amin, Mazleena Salleh, Subariah Ibrahim, M. R. Katmin, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M83 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Comparing image quality of different steganographic techniquesent://SD_ILS/0/SD_ILS:4435122024-05-17T10:13:58Z2024-05-17T10:13:58Zby Azizah Abdul Manaf<br/>Author Azizah Abdul Manaf, Akram Mohd. Zeki, Sayuthi Jaafar, Salehuddin A. Kadir, International Conference on Information Technology and Multimedia (2005 : UNITEN, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 C655 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>