T Ahmad, TP Fiqar - Int. J. Innov. Comput. Inf. Control, 2018 - academia.edu
Protecting sensitive data such as military and medical data has played a significant role. Many methods have been introduced to secure and prevent the data from unauthorized …
In this digital era, transmitting data through a computer network has become common. Moreover, some applications have also been developed to do it. Nevertheless, users may …
MM Amrulloh, T Ahmad - International Journal of Intelligent Engineering & …, 2022 - inass.org
The rapid progress of information and communication technology forces all application aspects to be developed securely, considering that data are often transmitted over public …
AI Al-Attili, OA Al-Rababah - IJCSNS, 2011 - Citeseer
Hiding information inside audio files becomes a challenging discipline, since the Human Auditory System (HAS) is highly sensitive. One of the main obstacles of the data hiding in …
MM Amrulloh, T Ahmad - International Review on Modelling and …, 2022 - scholar.its.ac.id
With the massive development of information technology, all data cannot be assumed to be safe from illegal parties. Data can have a very high vulnerability to being accessed by the …
MHA Al-Hooti, T Ahmad, S Djanali - Indonesian Journal of Electrical …, 2019 - scholar.its.ac.id
Sharp development progress of information technology has affected many aspects including data security. This is because classified data are often transferred between systems. In this …
MB Andra, T Ahmad, T Usagawa - Engineering Letters, 2017 - engineeringletters.com
The rapid development of the network technology and internet have changed the way of how files are distributed, including sensitive data such as medical record. Some methods …
MS Atoum, OAA Rababah, AI Al-Attili - International Journal of Computer …, 2011 - Citeseer
Hiding information inside audio files becomes a challenging discipline, since the Human Auditory System (HAS) is highly sensitive. One of the main obstacles of the data hiding in …
R Setiawan, T Ahmad - 2020 8th International Conference on …, 2020 - ieeexplore.ieee.org
In information technology, security has played a crucial role in protecting data. One of the methods that can be used is by hiding the data in a cover file, such as audio. However, the …