A review of steganographic methods and techniques
The frequent and intensive transmission of information on the internet requires protection techniques to secure sensitive information. Steganography is one of many security techniques that consist of concealing information inside an appropriate multimedia (e.g. image, video,...
Saved in:
Main Authors: | Beroual, Abdessalam, Alshaikhli, Imad Fakhri Taha |
---|---|
Format: | Article |
Language: | English |
Published: |
Kulliyah of Information and Communication Technology, International Islamic University Malaysia
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/64307/1/ijpcc-abdulsalam.pdf http://irep.iium.edu.my/64307/ http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/56 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
AIPISteg: An active IP identification based steganographic method
by: Abdullaziz, O.I., et al.
Published: (2016) -
Comparative analysis on the image steganographic algorithms
by: Selvamani, Rosshini, et al.
Published: (2022) -
Analytical Review on Graphical Formats Used in Image
Steganographic Compression
by: Din, Roshidi, et al.
Published: (2018) -
A scientific review of soft-computing techniques and methods
for stock market prediction
by: Islam, Muhammad Rabiul, et al.
Published: (2018) -
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)