Search Results - (( cover detection method algorithm ) OR ( based information needs algorithm ))

Refine Results
  1. 1

    Prototype development for embedding large amount of information using secure LSB and neural based steganography by Saleh, Basam N.

    Published 2009
    “…The challenge to Steganography is the amount of information to be embedded in the host file without affecting the properties of that file and to avoid distortion of the image, the video, or the sound host file and as a result, to avoid detection of hidden information existence. The need for new methods, techniques and algorithms to make enhancements regarding increasing the amount the hidden information, preserving the host file quality, preserving the size of the file, and keep it robust against steganalysis. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Processing and classification of landsat and sentinel images for oil palm plantation detection by Mohd Ibrahim, Azhar, Asming, Muhammad Anwar Azizan, Abir, Intiaz Mohammad

    Published 2022
    “…One of the capabilities of remote sensing is the detection of oil palm plantations. Therefore, this paper attempts to determine the best methods for image classification, especially for land cover classification of oil palm plantations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Spectral discrimination and index development of roofing materials and conditions using field spectroscopy and worldview-3 satellite image by Samsudin, Sarah Hanim

    Published 2016
    “…Normal supervised pixel-based classification scheme is often applied to map urban land use and land cover which the accuracy is dependent on the training site information. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets by Pradhan, Biswajeet

    Published 2006
    “…Thus image compression is a key factor to improve transmission speed and storage, but it risks losing relevant terrain information. Moreover, most of these algorithms are based either on Fourier transmission or on first order wavelet techniques. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Image segmentation for songket motif / Zati Iwani Zaharudin by Zaharudin, Zati Iwani

    Published 2007
    “…This paper will cover on comparison of three algorithms of image segmentation, determining which algorithm is more accurate in order to extract songket motifs and a prototype of image segmentation tool using the accurate algorithm determined. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Comparison of supervised classification technique of landuse map using high resolution image / Muhammad Firdaus Mohammad Harun by Mohammad Harun, Muhammad Firdaus

    Published 2019
    “…Remote sensing have been used to detect the changes of the land covers occurs by human activity. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki by Hamad Zaki, Ahmad Wafiy Hamad Zaki

    Published 2013
    “…Information Investigation Autopsy (IIA) is the tools that can captured the information needed on the Local Area Network environment and later needed to be secured, the IIA need a module that can to secure the evidence captured from any harm. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Assesment of robust tree detection technique for inter row trees tracking UAV based on simultaneous localization method / Norashikin M. Thamrin and Nor Hashim Mohd. Arshad by M. Thamrin, Norashikin, Mohd. Arshad, Nor Hashim

    Published 2014
    “…Most of row tracking techniques were implemented on mobile robot and the method varies in terms of sensors and algorithm used for detection for example Global Positioning System (GPS), vision based, laser, mechanical sensors and sensor fusion. …”
    Get full text
    Get full text
    Research Reports
  17. 17
  18. 18

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20