Discrete wavelet transform domain techniques

F Arab, SM Daud, SZ Hashim - 2013 International conference …, 2013 - ieeexplore.ieee.org
Discrete Wavelet Transform Domain Techniques Page 1 Discrete Wavelet Transform Domain
Techniques 1 Farnaz Arab, 2 Salwani Mohd Daud, 3 Siti Zaiton Mohd Hashim 1, 2 Advanced …

[PDF][PDF] Multimedia Data Hiding Evaluation Metrics

AAJ Al-Taay, SB Sahib, M Zamani - Recent Researches in …, 2013 - academia.edu
Multimedia Data Hiding Evaluation Metrics Page 1 Multimedia Data Hiding Evaluation Metrics
ALAA A. JABBAR AL-TAAY 1 , SHAHRIN BIN SAHIB 2 Faculty of Information & Communication …

Statistical steganalysis of four photo themes before embedding

AAJ Altaay, S bin Sahib… - … Conference on Advanced …, 2013 - ieeexplore.ieee.org
In order to analyze how the correlativity behavioral pattern would change after data
embedding, it needs to conduct a statistical analyze on average, maximum, minimum, and …

Pixel correlation behavior in different themes

AA Jabbar, SB Sahib, M Zamani - … 2013, Wuhan, China, November 8-10 …, 2013 - Springer
CCIS 398 - Pixel Correlation Behavior in Different Themes Page 1 F. Bian et al. (Eds.): GRMSE
2013, Part I, CCIS 398, pp. 223–234, 2013. © Springer-Verlag Berlin Heidelberg 2013 Pixel …

Correlation analysis of the four photo themes in five layers

AA Jabbar, SB Sahib, M Zamani - … 2013, Wuhan, China, November 8-10 …, 2013 - Springer
CCIS 398 - Correlation Analysis of the Four Photo Themes in Five Layers Page 1 F. Bian et al.
(Eds.): GRMSE 2013, Part I, CCIS 398, pp. 211–222, 2013. © Springer-Verlag Berlin Heidelberg …

Development of Semantic Analyzer for Audio Steganography Using Spread Spectrum Technique.

A Sharma, P Singh - International Journal of Advanced …, 2013 - search.ebscohost.com
In the current world of information technology, the sending and receiving of digital data
through network is not secure up to the extent. There is a need to maintain the robustness …

[PDF][PDF] An Introduction to Watermarking Techniques

AAJ AL-TAAY, SBIN SAHIB, M ZAMANI - academia.edu
This paper intends to give an overview of watermarking techniques, their uses and
applications. It also attempts to identify the requirements of a good steganographic algorithm …

[引用][C] A new method for audio steganography using message integrity

MS Atoum, S Ibrahim, G Sulong… - Journal of …, 2013 - Advanced Institutes of Convergence …

[引用][C] Improving the capacity of watermarking techniques by using block truncation coding

F Tohidi, ABA Manaf, M Zamani… - International …, 2013 - Advanced Institutes of Convergence …

[引用][C] Using three levels DWT to increase robustness against geometrical attacks

ZSS Dolatabadi, ABA Manaf… - International …, 2013 - Advanced Institutes of Convergence …