87 research outputs found
Teknik Tapisan Dalam Pemodelan Perceptron Multi Aras
This research is done to see the implication filtering technique on house price modeling performance in predicting based on pre-processing technique in learning capability in neural network using Multilayer Perceptron. This research also discuss the relationship between house
price analysis and neural network application in predicting terrace house price.
This research uses functional mathematics approach based on previous years house price index to predict the actual value of terrace house in the future. This approach is also used in predicting medium period by collecting actual terrace house price data in Kuala Lumpur. These data is
not only based on terrace house price index but also based on various aspect which involve direct or indirectly.
The obtained result is compared with actual price index the following year. Furthermore, the finding gained from the research model shows that is used will produce better prediction
Stego Keys Performance on Feature Based Coding Method in Text Domain
A main critical factor on embedding process in any text
steganography method is a key used known as stego key. This factor will
be influenced the success of the embedding process of text steganography
method to hide a message from third party or any adversary. One of the
important aspects on embedding process in text steganography method is
the fitness performance of the stego key. Three parameters of the fitness
performance of the stego key have been identified such as capacity ratio,
embedded fitness ratio and saving space ratio. It is because a better as
capacity ratio, embedded fitness ratio and saving space ratio offers of any
stego key; a more message can be hidden. Therefore, main objective of this
paper is to analyze three features coding based namely CALP, VERT and
QUAD of stego keys in text steganography on their capacity ratio,
embedded fitness ratio and saving space ratio. It is found that CALP
method give a good effort performance compared to VERT and QUAD
methods
Digital steganalysis: Computational intelligence approach
In this paper, we present a consolidated view of digital media steganalysis from the perspective of computational
intelligence.In our analysis the digital media steganalysis is divided into three domains which are image steganalysis, audio steganalysis, and video steganalysis.Three major computational intelligence methods have also been identified in the steganalysis domains which are bayesian, neural network, and genetic algorithm.Each of these methods has its own pros and cons
Evaluation Review on Effectiveness and Security Performances of Text Steganography Technique
Steganography is one of the categories in information hiding that is implemented to conceal the hidden message to ensure it cannot be recognized by human vision. This paper focuses on steganography implementation in text domain namely text steganography.Text steganography consists of two groups, which are word-rule based and feature-based techniques.This paper analysed these two categories of text steganography based on effectiveness and security evaluation because the effectiveness is critically important in order to determine that technique has the appropriate quality.Meanwhile, the security is important due to the intensity performance in securing the hidden message. The main goal of this paper is to review the evaluation of text steganography in terms of effectiveness and security that have been developed by previous research efforts. It is anticipated that this paper will identify the performance of text steganography based on effectiveness and security measurement
Computational intelligence in steganalysis environment
This paper presents gives a consolidated view of digital media steganalysis from the perspective of computational intelligence (CI). The environment of digital media steganalysis can be divided into three (3)domains which are image steganalysis, audio steganalysis, and video steganalysis. Three (3) major methods have also been identified in the computational intelligence based on these steganalysis domains which are bayesian, neural network, and genetic algorithm. Each of these methods has pros and cons. Therefore, it depends on the steganalyst to use and choose a suitable method based on their purposes and its environment
Implementing malay language in linguistic steganography / Amirulikhsan Zolkafli and Roshidi Din
Steganography, a part of information hiding is an art of hiding information into another medium of information (text, audio, video, image, etc ) with the main purpose is securing information during communication. With the purpose of opening an opportunity to create a communication channel that is covert and subliminal between two parties where by the existence of the particular message being sent and received are kept unknown or innocuous to any possible attacker. Steganography can be divided into two that is technical steganography and linguistic steganography. English have been widely used in linguistic steganography. Therefore, the main objective of this paper is to see whether other languages are compatible to be implement as linguistic steganography. This paper will discuss briefly on linguistic steganography and its system model. The comparison study is done based on linguistic aspects (syntactic and semantic) of several foreign language that have been developed into machine translation system. Chinese, Japanese, and Malay will be compared, in which the characteristic of Malay language will be highlighted in this paper. We will be discussing the purpose of using its language structure to hide secret information in it. This is to show several characteristic of Malay language that could be used in linguistic steganography. Finally, this paper by mentioning the general potential of information hiding and the impact in the form of applications that it could give to Information and Communication Technology (ICT) environment
Preserve Imperceptibility and Robustness Performance on Steganography Technique based on StegaSVM-Shifted LBS Model
In image steganography, the most popular and widely used techniques is the least significant bit (LSB) that hide data into a cover-image in a spatial and discrete cosine transform (DCT) domain as well.Beside the LSB technique, there is other technique that is also influential i.e support vector machine (SVM) normally used to strengthen the embedding algorithm.Whatever techniques used in the image steganography field,the main purpose is to keep the existence of the secret-message secret.This paper designing the new model is
proposed called StegaSVM-Shifted LSB model in DCT domain to preserve the imperceptibility and increase the robustness of stego-images.The StegaSVM-Shifted LSB model that has been proposed that utilize HVS and embedding technique through Shifted LSB showed a good performance
Smart cards and the fingerprint: a framework for user identification and authentication
Access control has been a great concern in this Information and Communication Technology (ICT) era. The need to control access to certain information and resources has been taken seriously by the ICT community. This research believes that no single security method, algorithm, key or procedure is entirely secure. Hence, a combination of multiple security components is mandatory to provide a high level of protection against fraud and other threats. This research combines two security components, which are the smart card and fingerprint recognition. It looks into the vulnerabilities of magnetic-stripe cards and Personal Identification Numbers (PIN) or passwords widely used in systems today. As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards
The evaluation performance of letter-based techniques on text steganography method
The implementation of steganography as information hiding in research area is able in covering hidden message in text, image, audio and video. This paper focuses on the implementation of development steganography in text domain named text steganography. Mostly, the researcher utilize the text steganography technique named feature-based technique that covers a hidden message based on the uniqueness of letters. One of the technique in feature-based is letter-based technique that is able to hide the hidden message in a language that uses A-Z letters. This paper focuses on the three techniques of letter-based text steganography that have a similar implementation process in covering the hidden message. The three techniques are evaluated using some parameters to obtain the size bit ratio, loading time and validation performance. This parameter used in order to notice that the process of covering the hidden message could be influence capacity of text, the length of time consuming and determine the quality performance in term of validation approach
- …