Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
Abstract. This paper sets the main focus on the evaluation of transparency, robustness and capacity of the embedding function of Substitution Techniques of digital audio steganography algorithms. Lots of steganography techniques have been... more
Abstract. This paper sets the main focus on the evaluation of transparency, robustness and capacity of the embedding function of Substitution Techniques of digital audio steganography algorithms. Lots of steganography techniques have been described in this literature.
Abstract: Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and organization's properties. Botnets are collections of compromised computers (Bots) which are remotely... more
Abstract: Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and organization's properties. Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Command-and-Control (C&C) infrastructure. They are used to distribute commands to the Bots for malicious activities such as distributed denial-of-service (DDoS) attacks, spam and phishing.
Abstract:-Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various... more
Abstract:-Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most important parameters for audio steganography are imperceptibility (indicated as PSNR), payload (bit rate or capacity), and robustness.
Abstract Watermarking using genetic algorithm for the optimization of the tread-off between the watermarking requirements has attacked the attention of researchers; amongst the watermarking requirements, the imperceptibility and... more
Abstract Watermarking using genetic algorithm for the optimization of the tread-off between the watermarking requirements has attacked the attention of researchers; amongst the watermarking requirements, the imperceptibility and robustness is the main requirements. Watermarking embedded in frequency domain using DWT or DCT can affect the imperceptibility and robustness of watermarking, this paper studies the effect of embedding domain on the imperceptibility and robustness in genetic watermarking.
Abstract:-Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the... more
Abstract:-Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such a way that it will be undetectable, robust and the innocent data should be able to accommodate high capacity of the secret data.
Abstract. Steganography is a technique that is used to “hide” confidential data residing in any form of media. Steganography technique is used with cryptography interchangeably to provide data protection. However, using these two methods... more
Abstract. Steganography is a technique that is used to “hide” confidential data residing in any form of media. Steganography technique is used with cryptography interchangeably to provide data protection. However, using these two methods together is incorrect. This is because the output from steganography is not quite visible while cryptography will generate a scrambled output that can easily draw attention. A detection method called Steganlysis is used to recognise the presence of steganography.
The process of generating, distributing and revoking a cryptographic key is called key management (Piper & Murphy, 2002; Fumy & Landrock, 1993). Key management is a very challenging area between cryptographers and attackers, and since... more
The process of generating, distributing and revoking a cryptographic key is called key management (Piper & Murphy, 2002; Fumy & Landrock, 1993). Key management is a very challenging area between cryptographers and attackers, and since finding keys of approved cryptographic techniques computationally is impossible, attackers prefer to somehow breach the key management process instead of trying to crack keys (Techateerawat & Jennings, 2007).
ABSTRACT The most important requirement of watermarking system is the quality of watermarked image. In most applications, the watermarking algorithm must embed the watermark such that this does not affect the quality of the underlying... more
ABSTRACT The most important requirement of watermarking system is the quality of watermarked image. In most applications, the watermarking algorithm must embed the watermark such that this does not affect the quality of the underlying host data. In order to improve the quality of watermarked image of the bit-plane model, the watermark object will be inserted to the selected bit-plane and the other 7 bit-planes will be changed to be very close to the original pixel.
Abstract Recognition of human faces out of many still images is a research field of fast increasing interest, and a fast and accurate algorithm is still a field to be explored. Our proposed approach in this research is based on Voronoi... more
Abstract Recognition of human faces out of many still images is a research field of fast increasing interest, and a fast and accurate algorithm is still a field to be explored. Our proposed approach in this research is based on Voronoi diagram and contour linearization. We use the former method to locate a probable region of faces and to compensate for some drawbacks of the parametric contour method.
Abstract—In today's day and age, one of the important topics in information security is authentication. There are several alternatives to text-based authentication of which includes Graphical Password (GP) or Graphical User Authentication... more
Abstract—In today's day and age, one of the important topics in information security is authentication. There are several alternatives to text-based authentication of which includes Graphical Password (GP) or Graphical User Authentication (GUA). These methods stems from the fact that humans recognized and remembers images better than alphanumerical text characters.
This research attempts to develop fuzzy based threat analysis model in which; linguistic variable, fuzzy number and fuzzy weighted average are applied to deal with the uncertainty problem in potential threats evaluation in Total Hospital... more
This research attempts to develop fuzzy based threat analysis model in which; linguistic variable, fuzzy number and fuzzy weighted average are applied to deal with the uncertainty problem in potential threats evaluation in Total Hospital Information System (THIS) environment. In fuzzification process, Triangular Average Number technique using two sets of membership functions was applied to evaluate “likelihood” and “consequence” of THIS threat variables upon a particular THIS asset.
Least Significant Bit (LSB) technique is the earliest developed technique in watermarking and it is also the most simple, direct and common technique. It essentially involves embedding the watermark by replacing the least significant bit... more
Least Significant Bit (LSB) technique is the earliest developed technique in watermarking and it is also the most simple, direct and common technique. It essentially involves embedding the watermark by replacing the least significant bit of the image data with a bit of the watermark data. The disadvantage of LSB is that it is not robust against attacks. In this study intermediate significant bit (ISB) has been used in order to improve the robustness of the watermarking system.
Abstract—Identify the ripeness of oil palm is essential for estimating the oil content. Therefore, choosing a right color model is extremely important to fit the purpose. Currently, manual system conducted by human grader at oil palm... more
Abstract—Identify the ripeness of oil palm is essential for estimating the oil content. Therefore, choosing a right color model is extremely important to fit the purpose. Currently, manual system conducted by human grader at oil palm mills lead to misconduct and disputes. Since color is main indicator of ripeness, it is important to research a right technique to determine the fruit ripeness identification. Thus, this paper aims to propose a suitable color model for oil palm fruit ripeness identification.
Abstract-Knowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which divides to textual and... more
Abstract-Knowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which divides to textual and graphical password. Over the last decade several attacks records for stealing user's identity and confidential information using a single or combination of attacks.
Abstract In this paper, methods for embedding watermark into digital video are presented. A watermark is a signal added to digital data such as audio, video and still images that can be detected or extracted later. The existence of such a... more
Abstract In this paper, methods for embedding watermark into digital video are presented. A watermark is a signal added to digital data such as audio, video and still images that can be detected or extracted later. The existence of such a watermark can be determined only through a watermark extraction or detection algorithm. Video watermarking is a process of watermark the sequence of video frames. Video can be considered as a stream of individual images.
Abstract: Least Significant Bit (LSB) is simple and fast calculated method for hiding watermarking, but it cannot protect itself from signal processing variations due to attacks. A watermark is only useful if it is resistant to typical... more
Abstract: Least Significant Bit (LSB) is simple and fast calculated method for hiding watermarking, but it cannot protect itself from signal processing variations due to attacks. A watermark is only useful if it is resistant to typical image processing operations as well as to malicious attacks. In this study, watermarking technique based on bit-planes has been developed in order to improve the robustness of direct embedding by LSB technique.
Abstract:-Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various... more
Abstract:-Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most important parameters for audio steganography are imperceptibility (indicated as PSNR), payload (bit rate or capacity), and robustness.
Abstract—Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the... more
Abstract—Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such a way that it will be undetectable, robust and the innocent data should be able to accommodate high capacity of the secret data. Unfortunately, these goals were not commonly seen in most of the techniques.
Abstract: In a digital image watermarking system, information carrying watermark is embedded in an image. The most important requirement of watermarking system is the quality of watermarked image. In most applications, the watermarking... more
Abstract: In a digital image watermarking system, information carrying watermark is embedded in an image. The most important requirement of watermarking system is the quality of watermarked image. In most applications, the watermarking algorithm must embed the watermark such that this does not affect the quality of the underlying host data. Although many watermarking techniques have been proposed by various researchers, the specific requirements of each watermarking technique vary with the used application.
Abstract Color is one of the main indicators for oil palm ripeness identification. Usually, human can interpret colors differently by just looking into them visually. Therefore, a suitable color model must be chosen in order to determine... more
Abstract Color is one of the main indicators for oil palm ripeness identification. Usually, human can interpret colors differently by just looking into them visually. Therefore, a suitable color model must be chosen in order to determine the right color for the right fruit. This paper exploits the use of Distance Measurements for histogram-based oil palm ripeness identification. In this study, HSV color model is chosen to explore its potential of colors. Four Distance Measurements are selected and compared in this study.
Abstract Steganography has proven to be one of the practical ways of securing data. It is a new kind of secret communication used mainly to hide secret data inside other innocent digital mediums. Most of existing steganographic techniques... more
Abstract Steganography has proven to be one of the practical ways of securing data. It is a new kind of secret communication used mainly to hide secret data inside other innocent digital mediums. Most of existing steganographic techniques use digital multimedia files as cover mediums to hide secret data. Audio files and signals make appropriate mediums for steganography due to the high data transmission rate and the high level of redundancy.
Abstract: The need for criminal identification is becoming ever more critical with the increasing number of crime occurred in our vast society. As numerous identification techniques are being used for many civilian and forensic... more
Abstract: The need for criminal identification is becoming ever more critical with the increasing number of crime occurred in our vast society. As numerous identification techniques are being used for many civilian and forensic applications, gait and its features have evoked considerable interest. The literature confirmed that accurate results can be found in gait identification using motion capture approach, especially in the critical area of clinical and sport application.
ABSTRACT The Passface is one of the most usable algorithms among recognition based graphical password category which suffer from vulnerabilities of shoulder surfing attack and teasing the user by using several steps during login. The main... more
ABSTRACT The Passface is one of the most usable algorithms among recognition based graphical password category which suffer from vulnerabilities of shoulder surfing attack and teasing the user by using several steps during login. The main objective of this study is to implement a Secure Passface (S-Passface) algorithm by changing the method of selecting the password during login phase.
Abstract—This paper presents a critical analysis on the trainee's competency assessment (evaluation) quality assurance and accreditation of Cyber forensic programs provided by some training institutions in USA, UK, Australia and China. It... more
Abstract—This paper presents a critical analysis on the trainee's competency assessment (evaluation) quality assurance and accreditation of Cyber forensic programs provided by some training institutions in USA, UK, Australia and China. It summarizes the existing competency assessment quality assurance based on both internal and external verification and accreditation for Associate and Diploma Degree Programs, Certificate Programs, Undergraduate Programs and Master/graduate Programs.
Abstract:-Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various... more
Abstract:-Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most important parameters for audio steganography are imperceptibility (indicated as PSNR), payload (bit rate or capacity), and robustness.
Abstract The authentications of digital images have become the center of attentions for certain group of companies since the number of doctored images increased. Tampering the digital images in a way that it's impossible to be detected by... more
Abstract The authentications of digital images have become the center of attentions for certain group of companies since the number of doctored images increased. Tampering the digital images in a way that it's impossible to be detected by naked eyes has become easier with development of image editing tools. Digital watermarking can preserve the authentication of digital images.
ABSTRACT In today's day and age, one of the important topics in information security is authentication and Graphical Password or Graphical User Authentication (GUA) is one of the most secure techniques. This paper will touch on the... more
ABSTRACT In today's day and age, one of the important topics in information security is authentication and Graphical Password or Graphical User Authentication (GUA) is one of the most secure techniques. This paper will touch on the security aspect of those algorithms and what most researchers have been working on trying to define these security features and attributes.
Watermarking is a special case of the general information hiding problem. The central idea is to robustly embed information in a medium known as the cover object in order to produce the stego object. The embedding is done in such a way... more
Watermarking is a special case of the general information hiding problem. The central idea is to robustly embed information in a medium known as the cover object in order to produce the stego object. The embedding is done in such a way that the cover and stego objects are indistinguishable
Abstract—Human gait identification is becoming ever more serious with the increasing number of application contributed to our vast society. The gait recognition capability using motion capture technology is supported by human gait... more
Abstract—Human gait identification is becoming ever more serious with the increasing number of application contributed to our vast society. The gait recognition capability using motion capture technology is supported by human gait recognition studies as well as other domains such as sport science, medicine (biomechanics), animation and humanoid robot which continue to suggest that gait is unique.
Abstract Analisis forensik perkakasan melibatkan proses menganalisa data yang di perolehi secara elektronik untuk menunjukkan bukti sama ada peralatan elektronik adalah digunakan untuk melakukan jenayah, mengandungi bukti jenayah atau ia... more
Abstract Analisis forensik perkakasan melibatkan proses menganalisa data yang di perolehi secara elektronik untuk menunjukkan bukti sama ada peralatan elektronik adalah digunakan untuk melakukan jenayah, mengandungi bukti jenayah atau ia adalah satu sasaran jenayah. Penyalahgunaan mesin permainan merupakan sumber utama permainan haram dijalankan.
Segmentation of human faces from still images is a research field of rapidly increasing interest. Although the field encounters several challenges, this paper seeks to present a novel face segmentation and facial feature extraction... more
Segmentation of human faces from still images is a research field of rapidly increasing interest. Although the field encounters several challenges, this paper seeks to present a novel face segmentation and facial feature extraction algorithm for gray intensity images (each containing a single face object). Face location and extraction must first be performed to obtain the approximate, if not exact, representation of a given face in an image.
Abstract Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the... more
Abstract Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those ...
Abstract Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the... more
Abstract Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those ...
This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers,... more
This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. Substitution techniques have naturally high capacity, but two major problems, having low robustness and transparency, negate the advantage. The robustness specially would be increased against those intentional attacks which try to reveal the ...
... [email protected] Mazdak Zamani Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia 54100 Kuala Lumpur, Malaysia [email protected] Meysam Namayandeh Centre ...
Abstract— Nowadays, we use cryptography keys to secure our communications. One of the common ways for securing data exchanging is via the use of symmetric keys to encipher transmitted data over network.... more
Abstract— Nowadays, we use cryptography keys to secure our communications. One of the common ways for securing data exchanging is via the use of symmetric keys to encipher transmitted data over network. Today's practices for managing keys face many issues in key generation, ...
Abstract In order to achieve secure access to color medical image, a symmetric color medical image encryption is proposed in this paper. The proposed algorithm is base on combination of scrambling and confusion processes. 2D lower... more
Abstract In order to achieve secure access to color medical image, a symmetric color medical image encryption is proposed in this paper. The proposed algorithm is base on combination of scrambling and confusion processes. 2D lower triangular map used for scrambling the addresses of image pixels, and the proposed propeller algorithm is used to confuse the gray values of image pixels. A number of security analyses conducted to evaluate the proposed algorithm including key space analysis, statistical analysis and ...
Abstract This paper proposes a high capacity reversible image watermarking scheme based on enhancement of difference expansion method. Reversible watermarking enables the embedding of useful information in a host signal without any loss... more
Abstract This paper proposes a high capacity reversible image watermarking scheme based on enhancement of difference expansion method. Reversible watermarking enables the embedding of useful information in a host signal without any loss of host information. We propose an enhancement of Difference Expansion technique whereby we can embed recursively into multiple layer of payload for grey scale and also RGB color scale, hence it increase capacity much better. The proposed technique improves the distortion ...
Page 1. Neda Jalaliyoon & Hamed Taherdoost International Journal of Business Research and Management (IJBRM) , Volume(1) : Issue(3) Utilizing the BSC and EFQM as a Combination Framework; Scrutinizing the Possibility by... more
Page 1. Neda Jalaliyoon & Hamed Taherdoost International Journal of Business Research and Management (IJBRM) , Volume(1) : Issue(3) Utilizing the BSC and EFQM as a Combination Framework; Scrutinizing the Possibility by TOPSIS Method Neda Jalaliyoon ...
... Malaysia e-mail: [email protected] Mazdak Zamani Universiti Teknologi Malaysia Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia e-mail: mazdak_zamani @yahoo.com Abstract-This paper presents a comprehensive ...
I. INTRODUCTION TEGANOGRAPHY is the study of techniques for hiding the existence of a secondary message in the presence of a primary message. The primary message is referred to as the carrier signal or carrier message; the secondary... more
I. INTRODUCTION TEGANOGRAPHY is the study of techniques for hiding the existence of a secondary message in the presence of a primary message. The primary message is referred to as the carrier signal or carrier message; the secondary message is referred to as the ...

And 4 more