Search Results - (( spatial information security algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- spatial information »
- application testing »
- testing algorithm »
- java application »
-
1
Challenges in multi-layer data security for video steganography
Published 2018Get full text
Get full text
Get full text
Article -
2
Spatial Signature Algorithm (SSA): A New Approach In Countermeasuring XML Signature Wrapping Attack
Published 2024journal::journal article -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…Existing algorithms in image security were developed based on Latin squares, DNA sequence etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
A New Model of Securing Iris Authentication Using Steganography
Published 2011“…In this paper, we proposed an enhancement of temporal-spatial domain algorithm which involves the scheme of Least Significant Bits (LSB) as the new model which converts iris images to binary stream and hides into a proper lower bit plane. …”
Get full text
Get full text
Article -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image / Hanizan Shaker Hussain
Published 2014“…The importance of information security in protecting data and information has increased due to the increased use of computers and the Internet. …”
Get full text
Get full text
Book Section -
8
DCT domain stegasvm-shifted LSB model for highly imperceptible and robust cover-image
Published 2015“…The importance of information security in protecting and hiding information has increased due to the increased use of computers and Internet.Information hiding technology such as Digital Image steganography embeds secret messages inside other files.Least Square Bit (LSB) is the most popular technique used in image steganography that hides data behind a cover-image in a spatial and discrete cosine transform (DCT) domain.Support Vector Machine (SVM) is another technique that is used to strengthen the embedding algorithm.The main aim of image steganography is to keep the secret-message remain secret regardless of the techniques used.But many of the previously proposed techniques failed to attain this aim.The main concerns to this problem are the non-random changes of a cover-image that constantly occurred after the embedding process and the non-robustness of the embedding algorithm to image processing operation.This study therefore proposes a new model that utilises Human Visual System (HVS) and embedding technique through shifted LSB called StegaSVM-Shifted LSB in DCT domain to preserve the imperseptibility and increase the robustness of stego-images.The proposed technique shows better performances compared to other existing techniques.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
12
A Query-Driven Spatial Data Warehouse Conceptual Schema For Disaster Management
Published 2016“…These problems must be addressed as they are main roadblocks to the process of accessing and retrieving information. The existence of heterogeneous data sources and restricted accessibility to relevant information during a disaster causes several issues with spatial data warehouse design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
-
14
-
15
Data Hiding Techniques In Digital Images
Published 2003“…In the spatial domain techniques, a digital image serves as a carrier for a secret message. …”
Get full text
Get full text
Thesis -
16
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
17
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
18
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
19
-
20
