Search Results - (( cover detection method algorithm ) OR ( based information needs algorithm ))
Search alternatives:
- based information »
- method algorithm »
- cover detection »
- needs algorithm »
-
1
Prototype development for embedding large amount of information using secure LSB and neural based steganography
Published 2009“…The challenge to Steganography is the amount of information to be embedded in the host file without affecting the properties of that file and to avoid distortion of the image, the video, or the sound host file and as a result, to avoid detection of hidden information existence. The need for new methods, techniques and algorithms to make enhancements regarding increasing the amount the hidden information, preserving the host file quality, preserving the size of the file, and keep it robust against steganalysis. …”
Get full text
Get full text
Thesis -
2
Processing and classification of landsat and sentinel images for oil palm plantation detection
Published 2022“…One of the capabilities of remote sensing is the detection of oil palm plantations. Therefore, this paper attempts to determine the best methods for image classification, especially for land cover classification of oil palm plantations. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Spectral discrimination and index development of roofing materials and conditions using field spectroscopy and worldview-3 satellite image
Published 2016“…Normal supervised pixel-based classification scheme is often applied to map urban land use and land cover which the accuracy is dependent on the training site information. …”
Get full text
Get full text
Thesis -
4
An efficient method for detecting covered face scenarios in ATM surveillance camera
Published 2020“…This paper presents a novel method to detect covered face from ATM surveillance camera images. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…Thus image compression is a key factor to improve transmission speed and storage, but it risks losing relevant terrain information. Moreover, most of these algorithms are based either on Fourier transmission or on first order wavelet techniques. …”
Get full text
Get full text
Thesis -
7
-
8
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
9
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Image segmentation for songket motif / Zati Iwani Zaharudin
Published 2007“…This paper will cover on comparison of three algorithms of image segmentation, determining which algorithm is more accurate in order to extract songket motifs and a prototype of image segmentation tool using the accurate algorithm determined. …”
Get full text
Get full text
Thesis -
11
Comparison of supervised classification technique of landuse map using high resolution image / Muhammad Firdaus Mohammad Harun
Published 2019“…Remote sensing have been used to detect the changes of the land covers occurs by human activity. …”
Get full text
Get full text
Thesis -
12
Enhancement Of Cover Selection – Based Audio Steganography (CAS) Using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance
Published 2024thesis::doctoral thesis -
13
-
14
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013“…Information Investigation Autopsy (IIA) is the tools that can captured the information needed on the Local Area Network environment and later needed to be secured, the IIA need a module that can to secure the evidence captured from any harm. …”
Get full text
Get full text
Student Project -
15
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
16
Assesment of robust tree detection technique for inter row trees tracking UAV based on simultaneous localization method / Norashikin M. Thamrin and Nor Hashim Mohd. Arshad
Published 2014“…Most of row tracking techniques were implemented on mobile robot and the method varies in terms of sensors and algorithm used for detection for example Global Positioning System (GPS), vision based, laser, mechanical sensors and sensor fusion. …”
Get full text
Get full text
Research Reports -
17
-
18
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
19
Machine learning-based change detection for land use land cover in Malaysia
Published 2025“…Two classification methods were explored: supervised and unsupervised. …”
Get full text
Get full text
Get full text
Article -
20
A Systematic Review on Cover Selection Methods For Steganography: Trend Analysis, Novel Classification and Analysis of the Elements
Published 2026journal::journal article
