Traid-bit embedding process on Arabic text steganography method

R Din, RA Thabit, NI Udzir, S Utama - Bulletin of Electrical Engineering and …, 2021 - beei.org
The enormous development in the utilization of the Internet has driven by a continuous
improvement in the region of security. The enhancement of the security embedded …

Analysis review on feature-based and word-rule based techniques in text steganography

FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
This paper presents several techniques used in text steganography in term of feature-based
and word-rule based. Additionally, it analyses the performance and the metric evaluation of …

Data analytics using satellite remote sensing in healthcare applications

KI Lakhtaria, SS Iyer - Machine Learning and Data Mining in Aerospace …, 2020 - Springer
Water Management is the greatest challenge facing mankind. Satellites remote sensing can
be one of the most important sources of identifying and segregating lakes, rivers and …

Comparative study of multimedia question answering system models

HB Patel, SS Iyer - ECS Transactions, 2022 - iopscience.iop.org
Abstract Question Answering Systems is a mechanized way to deal with finding right
solution to the inquiries posed by human in their own language. The enormous measure of …

Cloud Deployed PHR Using ABE Scheme

R Jaiswal, SS Iyer - ECS Transactions, 2022 - iopscience.iop.org
Personal health record (PHR) is a patient's personal health information where a patient can
store and maintain his personal health details in a cloud server which is a third party …

[PDF][PDF] Clustering Algorithm for Text Steganography

SS Iyer, K Lakhtaria - … Journal of Advanced Research in Computer …, 2016 - researchgate.net
Data Mining Techniques have been deployed in extracting solutions for Business problems.
This paper is an attempt to explore the world of Data Mining techniques and how it can be …

Intensify Assured PHR Sharing in Cloud Using Entropy Based Signature Cryptosystem

R Jaiswal, SS Iyer, K Arora - ECS Transactions, 2022 - iopscience.iop.org
Abstract Personal Health Record (PHR) in cloud database is stored, manipulated, and
shared with users for high value of health care. The challenge is privacy of sensitive …

[PDF][PDF] Human Emotion Identification from Speech using Neural Network

B Rajdeep, HB Patel, S Iyer - International Journal of Computers, 2022 - npublications.com
Detection of mood and behavior by voice analysis which helps to detect the speaker's mood
by the voice frequency. Here, I aim to present the mood like happy, and sad and behavior …

[PDF][PDF] TEKNIK PENYEMBUNYIAN MESEJ DALAM STEGANOGRAFI TEKS MENGGUNAKAN PENDEKATAN WARNA RGB DAN

P RAWAK, BBIN OSMAN - etd.uum.edu.my
Steganografi merupakan teknik untuk melindungi kerahsiaan dan integriti data di dalam
medium pelindung agar data yang disembunyikan tidak dicurigai. Penyembunyian mesej di …