Search Results - (( data hiding problem algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- problem algorithm »
- java application »
- hiding problem »
- data hiding »
-
1
A Novel Reversible Data Hiding Technique with High Capacity and Less Overhead Information
Published 2012“…To increase the payload of embedded data in a cover image, the proposed algorithm reduces the number of bits that represent the secret data without any corruption of that secret data. …”
Get full text
Get full text
Article -
2
Sharp-Edges Steganography in Arabic Characters for Information Hiding
Published 2011“…In order to resolve the problem, sharp-edges stego method focusing in the individual Arabic characters as the redundant data. …”
Get full text
Get full text
Thesis -
3
Data Hiding Techniques In Digital Images
Published 2003“…Therefore how to protect secret messages during transmission becomes an important issue. Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
Get full text
Get full text
Thesis -
4
A Study And Analysis Of Watermarking Algorithms For Medical Images
Published 2010Get full text
Get full text
Thesis -
5
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Numerous data security and hiding algorithms have been developed in the last decade. …”
Get full text
Get full text
Student Project -
6
Steganography For Embedding Data In Digital Image
Published 2003“…Data hiding is concerned to be as a communication problem where the embedded data is the signal to be transmitted. …”
Get full text
Get full text
Thesis -
7
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
8
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
11
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
12
DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image
Published 2015“…The importance of information security in protecting and hiding information has increased due to the increased use of computers and Internet.Information hiding technology such as Digital Image steganography embeds secret messages inside other files.Least Square Bit (LSB) is the most popular technique used in image steganography that hides data behind a cover-image in a spatial and discrete cosine transform (DCT) domain.Support Vector Machine (SVM) is another technique that is used to strengthen the embedding algorithm.The main aim of image steganography is to keep the secret-message remain secret regardless of the techniques used.But many of the previously proposed techniques failed to attain this aim.The main concerns to this problem are the non-random changes of a cover-image that constantly occurred after the embedding process and the non-robustness of the embedding algorithm to image processing operation.This study therefore proposes a new model that utilises Human Visual System (HVS) and embedding technique through shifted LSB called StegaSVM-Shifted LSB in DCT domain to preserve the imperseptibility and increase the robustness of stego-images.The proposed technique shows better performances compared to other existing techniques.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…Image watermarking is a method to hide a message in an image for transmission of secret data or identification purposes. …”
Get full text
Get full text
Thesis -
14
-
15
Challenges in multi-layer data security for video steganography
Published 2018“…On the other side, the hybridization of the algorithms, increase memory complexity and increase computation time for data embedding. …”
Get full text
Get full text
Get full text
Article -
16
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
17
DCT domain Stegasvm-shifted LSB model for highly imperceptible and robust cover-image / Hanizan Shaker Hussain
Published 2014“…In image steganography, the most popular and widely usedtechniques is the least significant bit (LSB) that hide data into a cover-image in a spatial and discrete cosine transform (DCT) domain as well. …”
Get full text
Get full text
Thesis -
18
-
19
Securing quick response (QR) code using steganography / Muhammad Danial Mohd Alwi
Published 2021“…I have enhancing the QR-code steganography method by using LSB technique in RGB images and QR-code data input image pattern. An LSB method is presented in this paper to hide the message clearly within the secure transfer.…”
Get full text
Get full text
Student Project -
20
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph
