Search Results - messages - methods

Search alternatives:

Refine Results
  1. 1

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. The aim of this project was to detect a hidden message in an observed message using text steganalysis.…”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Method and system for steganography within handwritten signature images by Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Wan Adnan, Wan Azizun

    Published 2013
    “…A method for encoding a text message within a handwritten signature includes the steps of pre-processing the handwritten signature for preparing the signature into a suitable format for extracting at least one attribute of the handwritten signature, extracting the at least one attribute of the handwritten signature from the suitable format, coding the text message into a pre-defined coding format and encrypting the text message into an encrypted code and embedding the encrypted code of the text message within the at least one attribute extracted from the handwritten signature. …”
    Get full text
    Patent
  3. 3

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…At present, there are no mobile applications that have an encryption and decryption text method before sending and receiving the messages. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Analisis mesej dakwah Islamiah dalam halaman Facebook by Mohd Nazif, Badruddin

    Published 2017
    “…However, the focus on Islamic messages using the medium is limited and requires a deeper understanding especially in terms of its form, purpose and method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah by Adewole Kayode, Sakariyah

    Published 2018
    “…There are hundreds of published works related to spam message and spam account detection that aim to identify effective detection methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive minimum error least significant bit replacement method for steganography using JPG/JPEG and PNG files by Wamiliana, Wamiliana, Usman, Mustofa, Azram, Mohammad, Elfaki, Faiz Ahmed Mohamed, Hijriani, Astria, Panditatwa, Pandya

    Published 2015
    “…Therefore, if there is a secret message, then it can be easily seen. One method for sending data without making curiosity is using the steganography where a secret message can be transmitted in such a way so that attackers are not aware of the existence of something in the message. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Experimenting text input methods in mobile application / Anuar Mohd Yusof by Mohd Yusof, Anuar

    Published 2005
    “…There are numerous errors when typing messages using text input methods. Moreover, some text input methods are just too expensive and these methods take so much space in mobile phones' memory. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Teknik penyembunyian mesej dalam steganografi teks menggunakan pendekatan warna RGB dan penempatan rawak by Baharudin, Osman

    Published 2020
    “…Beside, this method also capable of producing dynamic secret messages using a single cover text.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A framework for sms spam filtering by Loke, Chi Kuan

    Published 2014
    “…This paper proposed methods on how to filter the spam messages. In the content of this paper, the discussions are mainly how to use the functionality of bag-of-words, importance of feature extraction and classification for the incoming unknown messages. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10

    Mobile Instant Messaging as Collaborative Tool for Language Learning by Kasturi, Sivabalan, Zuraina, Ali

    Published 2019
    “…Numerous issues, such as exploration of the application, the research methods, participants, intervention duration, teaching method, collaborative learning strategies, impacts, and challenges were addressed. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Securing quick response (QR) code using steganography / Muhammad Danial Mohd Alwi by Mohd Alwi, Muhammad Danial

    Published 2021
    “…An LSB method is presented in this paper to hide the message clearly within the secure transfer.…”
    Get full text
    Get full text
    Student Project
  12. 12

    Implementing multi prime RSA digital signature in Shamir’s three pass protocol / Muhammad Arif Musa Abdullah, Muhammad Alif Haidhar Halim and Nur Muhammad Danish Raisham by Abdullah, Muhammad Arif Musa, Halim, Muhammad Alif Haidhar, Raisham, Nur Muhammad Danish

    Published 2023
    “…The methodology is sending the messages using Shamir’s Three Pass Protocol but the encrypted message will be signed using RSA digital signature method to be able to verify the sender and receiver. …”
    Get full text
    Get full text
    Student Project
  13. 13

    A study on comparison between common object request broker arcmtecture (CORBA) and XYBASE message broker (XMB) / Inna Mohd Izman by Mohd Izman, Inna

    Published 2003
    “…In the fourth chapters, it provides information on research methodology, whereby it will describe on the data collection method. The method is used to gather all the related information about the research. …”
    Get full text
    Thesis
  14. 14

    Detection of presence marks in stegocontent by Chia Meng, Sia

    Published 2013
    “…LSB is the method that most commonly used in steganography to hide message.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    SMSAD: a framework for spam message and spam account detection by Adewole, Kayode Sakariyah, Anuar, Nor Badrul, Kamsin, Amirrudin, Sangaiah, Arun Kumar

    Published 2019
    “…In addition, microblogging messages are very unstructured and noisy. These distinguished characteristics posed challenges to existing email spam detection models for effective spam identification in short message communication media. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Loss versus gain: integrating technology and message framing in promoting proper hand washing among grade 1 pupils by Analin B

    Published 2011
    “…The data was gathered through a pre-test and post-test method. In the analysis, the total average scores of the posttest of each group, positive message framing and negative message framing, was used to determine which type of message framing through an AVP is more effective in teaching and promoting proper hand washing. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Opinion mining of movie review using hybrid method of support vector machine and particle swarm optimization by Hasan Basari, Abd Samad, Burairah, Hussin, Pramudya Ananta, Gede, Zeniarja, Junta

    Published 2012
    “…The positive class shows good message opinion; otherwise the negative class shows the bad message opinion of certain movies. …”
    Get full text
    Get full text
    Conference or Workshop Item