Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method

Computer security features for web applications are widely needed in many fields especially in defense industry. Detection phase is the most important aspect in the security development. Detection and investigation is commonly used to identify the suspected evidences from the computer crime. Stegano...

Full description

Saved in:
Bibliographic Details
Main Author: Sivasangari, Krishnan
Format: Undergraduates Project Papers
Language:English
Published: 2013
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/6976/1/CD7652.pdf
http://umpir.ump.edu.my/id/eprint/6976/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ump.umpir.6976
record_format eprints
spelling my.ump.umpir.69762021-06-11T07:49:46Z http://umpir.ump.edu.my/id/eprint/6976/ Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method Sivasangari, Krishnan HV Social pathology. Social and public welfare Computer security features for web applications are widely needed in many fields especially in defense industry. Detection phase is the most important aspect in the security development. Detection and investigation is commonly used to identify the suspected evidences from the computer crime. Steganography technique become the common approach for detect image based evidence. Previously, encryption technique is applied into image which is trial and error is applied to get precise evidences. This will cause the evidence to be not valid if proceed to the court. In this project steganography is used to get precise set of evidences in order to achieve desired proof to proceed to the court. Based on project, steganography is able to produce the output that precise to the desired output. From the output, the text document saved into computer to produce a solid evidence so that the cases related cybercrime can be proceed to the court. This technique overcomes the problem of trial and error in encryption to get the desired evidences. Steganography with encrypted able to produce a strong security environment in the computer to preserve the confidential and private information. 2013 Undergraduates Project Papers NonPeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/6976/1/CD7652.pdf Sivasangari, Krishnan (2013) Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method. Faculty of Computer System and Software Engineering, Universiti Malaysia Pahang.
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic HV Social pathology. Social and public welfare
spellingShingle HV Social pathology. Social and public welfare
Sivasangari, Krishnan
Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method
description Computer security features for web applications are widely needed in many fields especially in defense industry. Detection phase is the most important aspect in the security development. Detection and investigation is commonly used to identify the suspected evidences from the computer crime. Steganography technique become the common approach for detect image based evidence. Previously, encryption technique is applied into image which is trial and error is applied to get precise evidences. This will cause the evidence to be not valid if proceed to the court. In this project steganography is used to get precise set of evidences in order to achieve desired proof to proceed to the court. Based on project, steganography is able to produce the output that precise to the desired output. From the output, the text document saved into computer to produce a solid evidence so that the cases related cybercrime can be proceed to the court. This technique overcomes the problem of trial and error in encryption to get the desired evidences. Steganography with encrypted able to produce a strong security environment in the computer to preserve the confidential and private information.
format Undergraduates Project Papers
author Sivasangari, Krishnan
author_facet Sivasangari, Krishnan
author_sort Sivasangari, Krishnan
title Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method
title_short Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method
title_full Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method
title_fullStr Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method
title_full_unstemmed Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method
title_sort hiding and retrieval of text content using discrete cosine transformation (dct) and tripledes (3des) method
publishDate 2013
url http://umpir.ump.edu.my/id/eprint/6976/1/CD7652.pdf
http://umpir.ump.edu.my/id/eprint/6976/
_version_ 1703960726161326080
score 13.160551