Search Results for Steganography - Narrowed by: Data protection - Computer networks -- Security measures SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dSteganography$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection$002509Data$002bprotection$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ic$003dtrue$0026ps$003d300?dt=list 2024-05-17T10:13:58Z Information hiding using steganography ent://SD_ILS/0/SD_ILS:358844 2024-05-17T10:13:58Z 2024-05-17T10:13:58Z by&#160;Muhalim Mohamed Amin<br/>Author&#160;Muhalim Mohamed Amin,&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;M. R. Katmin,&#160;National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M83 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Comparing image quality of different steganographic techniques ent://SD_ILS/0/SD_ILS:443512 2024-05-17T10:13:58Z 2024-05-17T10:13:58Z by&#160;Azizah Abdul Manaf<br/>Author&#160;Azizah Abdul Manaf,&#160;Akram Mohd. Zeki,&#160;Sayuthi Jaafar,&#160;Salehuddin A. Kadir,&#160;International Conference on Information Technology and Multimedia (2005 : UNITEN, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C655 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/>