IB Prayogi, T Ahmad, NJ de La Croix… - … on Information & …, 2021 - ieeexplore.ieee.org
Today's information technology tools allow people to share personal data and information through online media. Data security techniques are also developed to protect confidential …
T Ahmad, JN Faruki, RM Ijtihadie… - 2019 5th International …, 2019 - ieeexplore.ieee.org
A rapid technological development of information technology has many advantages to the public. Transferring data which may be previously difficult to do, now can be done easier …
In this digital era, transmitting data through a computer network has become common. Moreover, some applications have also been developed to do it. Nevertheless, users may …
MHA Al-Hooti, T Ahmad… - … Conference on Computer …, 2018 - ieeexplore.ieee.org
Data hiding is proposed as a solution that helps to secure any significant information. These techniques conceal the existence of a secret message that is confidentially inserted into …
AE Altinbaş, Y Yalman - 2021 6th International Conference on …, 2021 - ieeexplore.ieee.org
Today, the development of data hiding techniques for information security or confidential communication is a subject of great demand and interest. The main purpose of most studies …
R Setiawan, T Ahmad - International Journal of Intelligent Engineering & …, 2020 - inass.org
The internet is widely applied to facilitate the transferring process of data as a means of communication. Some of this transferred message has confidential information and must be …
T Ahmad, TP Fiqar - Int. J. Innov. Comput. Inf. Control, 2018 - academia.edu
Protecting sensitive data such as military and medical data has played a significant role. Many methods have been introduced to secure and prevent the data from unauthorized …
FA Adhiyaksa, T Ahmad, AM Shiddiqi… - … Seminar on Machine …, 2022 - ieeexplore.ieee.org
Security of data is critical given the rapid development of information technology due to the illegal access to personal or confidential data. This has made security methods to hide …
D Avci, T Tuncer, E Avci - 2018 6th International Symposium on …, 2018 - ieeexplore.ieee.org
Transparency, durability and capacity are the performance criteria of data hiding algorithms. In this study, data hiding was performed for the audio data. The most commonly used …