Search Results - (( data hiding problem algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- problem algorithm »
- java simulation »
- hiding problem »
- data hiding »
-
1
A Novel Reversible Data Hiding Technique with High Capacity and Less Overhead Information
Published 2012“…To increase the payload of embedded data in a cover image, the proposed algorithm reduces the number of bits that represent the secret data without any corruption of that secret data. …”
Get full text
Get full text
Article -
2
Sharp-Edges Steganography in Arabic Characters for Information Hiding
Published 2011“…In order to resolve the problem, sharp-edges stego method focusing in the individual Arabic characters as the redundant data. …”
Get full text
Get full text
Thesis -
3
Data Hiding Techniques In Digital Images
Published 2003“…Therefore how to protect secret messages during transmission becomes an important issue. Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
Get full text
Get full text
Thesis -
4
A Study And Analysis Of Watermarking Algorithms For Medical Images
Published 2010Get full text
Get full text
Thesis -
5
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Numerous data security and hiding algorithms have been developed in the last decade. …”
Get full text
Get full text
Student Project -
6
Steganography For Embedding Data In Digital Image
Published 2003“…Data hiding is concerned to be as a communication problem where the embedded data is the signal to be transmitted. …”
Get full text
Get full text
Thesis -
7
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
8
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
9
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
10
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
11
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
12
DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image
Published 2015“…The importance of information security in protecting and hiding information has increased due to the increased use of computers and Internet.Information hiding technology such as Digital Image steganography embeds secret messages inside other files.Least Square Bit (LSB) is the most popular technique used in image steganography that hides data behind a cover-image in a spatial and discrete cosine transform (DCT) domain.Support Vector Machine (SVM) is another technique that is used to strengthen the embedding algorithm.The main aim of image steganography is to keep the secret-message remain secret regardless of the techniques used.But many of the previously proposed techniques failed to attain this aim.The main concerns to this problem are the non-random changes of a cover-image that constantly occurred after the embedding process and the non-robustness of the embedding algorithm to image processing operation.This study therefore proposes a new model that utilises Human Visual System (HVS) and embedding technique through shifted LSB called StegaSVM-Shifted LSB in DCT domain to preserve the imperseptibility and increase the robustness of stego-images.The proposed technique shows better performances compared to other existing techniques.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…Image watermarking is a method to hide a message in an image for transmission of secret data or identification purposes. …”
Get full text
Get full text
Thesis -
14
Challenges in multi-layer data security for video steganography
Published 2018“…On the other side, the hybridization of the algorithms, increase memory complexity and increase computation time for data embedding. …”
Get full text
Get full text
Get full text
Article -
15
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
16
DCT domain Stegasvm-shifted LSB model for highly imperceptible and robust cover-image / Hanizan Shaker Hussain
Published 2014“…In image steganography, the most popular and widely usedtechniques is the least significant bit (LSB) that hide data into a cover-image in a spatial and discrete cosine transform (DCT) domain as well. …”
Get full text
Get full text
Thesis -
17
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
18
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
19
-
20
Securing quick response (QR) code using steganography / Muhammad Danial Mohd Alwi
Published 2021“…I have enhancing the QR-code steganography method by using LSB technique in RGB images and QR-code data input image pattern. An LSB method is presented in this paper to hide the message clearly within the secure transfer.…”
Get full text
Get full text
Student Project
