85 research outputs found
Teknik Tapisan Dalam Pemodelan Perceptron Multi Aras
This research is done to see the implication filtering technique on house price modeling performance in predicting based on pre-processing technique in learning capability in neural network using Multilayer Perceptron. This research also discuss the relationship between house
price analysis and neural network application in predicting terrace house price.
This research uses functional mathematics approach based on previous years house price index to predict the actual value of terrace house in the future. This approach is also used in predicting medium period by collecting actual terrace house price data in Kuala Lumpur. These data is
not only based on terrace house price index but also based on various aspect which involve direct or indirectly.
The obtained result is compared with actual price index the following year. Furthermore, the finding gained from the research model shows that is used will produce better prediction
Steganography analysis techniques applied to audio and image files
The present work carries out a descriptive analysis of the main steganography techniques used in specific digital media such as audio and image files. For this purpose, a literary review of the domains, methods, and techniques as part of this set was carried out and their functioning, qualities, and weaknesses are identified. Hence, it is concluded that there is a wide relationship between audio and image steganography techniques in their implementation form. Nevertheless, it is determined that LSB is one of the weakest techniques, but the safest and the most robust technique within each type of the presented medium
Stego Keys Performance on Feature Based Coding Method in Text Domain
A main critical factor on embedding process in any text
steganography method is a key used known as stego key. This factor will
be influenced the success of the embedding process of text steganography
method to hide a message from third party or any adversary. One of the
important aspects on embedding process in text steganography method is
the fitness performance of the stego key. Three parameters of the fitness
performance of the stego key have been identified such as capacity ratio,
embedded fitness ratio and saving space ratio. It is because a better as
capacity ratio, embedded fitness ratio and saving space ratio offers of any
stego key; a more message can be hidden. Therefore, main objective of this
paper is to analyze three features coding based namely CALP, VERT and
QUAD of stego keys in text steganography on their capacity ratio,
embedded fitness ratio and saving space ratio. It is found that CALP
method give a good effort performance compared to VERT and QUAD
methods
Evaluation Review on Effectiveness and Security Performances of Text Steganography Technique
Steganography is one of the categories in information hiding that is implemented to conceal the hidden message to ensure it cannot be recognized by human vision. This paper focuses on steganography implementation in text domain namely text steganography.Text steganography consists of two groups, which are word-rule based and feature-based techniques.This paper analysed these two categories of text steganography based on effectiveness and security evaluation because the effectiveness is critically important in order to determine that technique has the appropriate quality.Meanwhile, the security is important due to the intensity performance in securing the hidden message. The main goal of this paper is to review the evaluation of text steganography in terms of effectiveness and security that have been developed by previous research efforts. It is anticipated that this paper will identify the performance of text steganography based on effectiveness and security measurement
Digital steganalysis: Computational intelligence approach
In this paper, we present a consolidated view of digital media steganalysis from the perspective of computational
intelligence.In our analysis the digital media steganalysis is divided into three domains which are image steganalysis, audio steganalysis, and video steganalysis.Three major computational intelligence methods have also been identified in the steganalysis domains which are bayesian, neural network, and genetic algorithm.Each of these methods has its own pros and cons
Computational intelligence in steganalysis environment
This paper presents gives a consolidated view of digital media steganalysis from the perspective of computational intelligence (CI). The environment of digital media steganalysis can be divided into three (3)domains which are image steganalysis, audio steganalysis, and video steganalysis. Three (3) major methods have also been identified in the computational intelligence based on these steganalysis domains which are bayesian, neural network, and genetic algorithm. Each of these methods has pros and cons. Therefore, it depends on the steganalyst to use and choose a suitable method based on their purposes and its environment
Preserve Imperceptibility and Robustness Performance on Steganography Technique based on StegaSVM-Shifted LBS Model
In image steganography, the most popular and widely used techniques is the least significant bit (LSB) that hide data into a cover-image in a spatial and discrete cosine transform (DCT) domain as well.Beside the LSB technique, there is other technique that is also influential i.e support vector machine (SVM) normally used to strengthen the embedding algorithm.Whatever techniques used in the image steganography field,the main purpose is to keep the existence of the secret-message secret.This paper designing the new model is
proposed called StegaSVM-Shifted LSB model in DCT domain to preserve the imperceptibility and increase the robustness of stego-images.The StegaSVM-Shifted LSB model that has been proposed that utilize HVS and embedding technique through Shifted LSB showed a good performance
Smart cards and the fingerprint: a framework for user identification and authentication
Access control has been a great concern in this Information and Communication Technology (ICT) era. The need to control access to certain information and resources has been taken seriously by the ICT community. This research believes that no single security method, algorithm, key or procedure is entirely secure. Hence, a combination of multiple security components is mandatory to provide a high level of protection against fraud and other threats. This research combines two security components, which are the smart card and fingerprint recognition. It looks into the vulnerabilities of magnetic-stripe cards and Personal Identification Numbers (PIN) or passwords widely used in systems today. As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards
The evaluation performance of letter-based techniques on text steganography method
The implementation of steganography as information hiding in research area is able in covering hidden message in text, image, audio and video. This paper focuses on the implementation of development steganography in text domain named text steganography. Mostly, the researcher utilize the text steganography technique named feature-based technique that covers a hidden message based on the uniqueness of letters. One of the technique in feature-based is letter-based technique that is able to hide the hidden message in a language that uses A-Z letters. This paper focuses on the three techniques of letter-based text steganography that have a similar implementation process in covering the hidden message. The three techniques are evaluated using some parameters to obtain the size bit ratio, loading time and validation performance. This parameter used in order to notice that the process of covering the hidden message could be influence capacity of text, the length of time consuming and determine the quality performance in term of validation approach
The analysis performance of effectiveness and security metric IT domain
The development in information technology (IT) has become a pheunomenem in this era that influences almost aspects of human life. The competitive implementation in developing IT has become concern to enhance the performance system.Therefore, it is important to evaluate the IT implementation in order to discover the performance in achieving a desirable output. This paper concerns about evaluation in terms of effectiveness and security metrics performance. It is because the effectiveness and security is predicted to be able to maintain and improve the develpement performance. The objective of the paper is to discover the importance of effectiveness and security peformances in some of IT domains that could be a concern in evaluation after development process in order to achieve expected performance
- …