83 research outputs found

    Teknik Tapisan Dalam Pemodelan Perceptron Multi Aras

    Get PDF
    This research is done to see the implication filtering technique on house price modeling performance in predicting based on pre-processing technique in learning capability in neural network using Multilayer Perceptron. This research also discuss the relationship between house price analysis and neural network application in predicting terrace house price. This research uses functional mathematics approach based on previous years house price index to predict the actual value of terrace house in the future. This approach is also used in predicting medium period by collecting actual terrace house price data in Kuala Lumpur. These data is not only based on terrace house price index but also based on various aspect which involve direct or indirectly. The obtained result is compared with actual price index the following year. Furthermore, the finding gained from the research model shows that is used will produce better prediction

    Steganography analysis techniques applied to audio and image files

    Get PDF
    The present work carries out a descriptive analysis of the main steganography techniques used in specific digital media such as audio and image files. For this purpose, a literary review of the domains, methods, and techniques as part of this set was carried out and their functioning, qualities, and weaknesses are identified. Hence, it is concluded that there is a wide relationship between audio and image steganography techniques in their implementation form. Nevertheless, it is determined that LSB is one of the weakest techniques, but the safest and the most robust technique within each type of the presented medium

    Stego Keys Performance on Feature Based Coding Method in Text Domain

    Get PDF
    A main critical factor on embedding process in any text steganography method is a key used known as stego key. This factor will be influenced the success of the embedding process of text steganography method to hide a message from third party or any adversary. One of the important aspects on embedding process in text steganography method is the fitness performance of the stego key. Three parameters of the fitness performance of the stego key have been identified such as capacity ratio, embedded fitness ratio and saving space ratio. It is because a better as capacity ratio, embedded fitness ratio and saving space ratio offers of any stego key; a more message can be hidden. Therefore, main objective of this paper is to analyze three features coding based namely CALP, VERT and QUAD of stego keys in text steganography on their capacity ratio, embedded fitness ratio and saving space ratio. It is found that CALP method give a good effort performance compared to VERT and QUAD methods

    Evaluation Review on Effectiveness and Security Performances of Text Steganography Technique

    Get PDF
    Steganography is one of the categories in information hiding that is implemented to conceal the hidden message to ensure it cannot be recognized by human vision. This paper focuses on steganography implementation in text domain namely text steganography.Text steganography consists of two groups, which are word-rule based and feature-based techniques.This paper analysed these two categories of text steganography based on effectiveness and security evaluation because the effectiveness is critically important in order to determine that technique has the appropriate quality.Meanwhile, the security is important due to the intensity performance in securing the hidden message. The main goal of this paper is to review the evaluation of text steganography in terms of effectiveness and security that have been developed by previous research efforts. It is anticipated that this paper will identify the performance of text steganography based on effectiveness and security measurement

    Digital steganalysis: Computational intelligence approach

    Get PDF
    In this paper, we present a consolidated view of digital media steganalysis from the perspective of computational intelligence.In our analysis the digital media steganalysis is divided into three domains which are image steganalysis, audio steganalysis, and video steganalysis.Three major computational intelligence methods have also been identified in the steganalysis domains which are bayesian, neural network, and genetic algorithm.Each of these methods has its own pros and cons

    Computational intelligence in steganalysis environment

    Get PDF
    This paper presents gives a consolidated view of digital media steganalysis from the perspective of computational intelligence (CI). The environment of digital media steganalysis can be divided into three (3)domains which are image steganalysis, audio steganalysis, and video steganalysis. Three (3) major methods have also been identified in the computational intelligence based on these steganalysis domains which are bayesian, neural network, and genetic algorithm. Each of these methods has pros and cons. Therefore, it depends on the steganalyst to use and choose a suitable method based on their purposes and its environment

    Preserve Imperceptibility and Robustness Performance on Steganography Technique based on StegaSVM-Shifted LBS Model

    Get PDF
    In image steganography, the most popular and widely used techniques is the least significant bit (LSB) that hide data into a cover-image in a spatial and discrete cosine transform (DCT) domain as well.Beside the LSB technique, there is other technique that is also influential i.e support vector machine (SVM) normally used to strengthen the embedding algorithm.Whatever techniques used in the image steganography field,the main purpose is to keep the existence of the secret-message secret.This paper designing the new model is proposed called StegaSVM-Shifted LSB model in DCT domain to preserve the imperceptibility and increase the robustness of stego-images.The StegaSVM-Shifted LSB model that has been proposed that utilize HVS and embedding technique through Shifted LSB showed a good performance

    The evaluation performance of letter-based techniques on text steganography method

    Get PDF
    The implementation of steganography as information hiding in research area is able in covering hidden message in text, image, audio and video. This paper focuses on the implementation of development steganography in text domain named text steganography. Mostly, the researcher utilize the text steganography technique named feature-based technique that covers a hidden message based on the uniqueness of letters. One of the technique in feature-based is letter-based technique that is able to hide the hidden message in a language that uses A-Z letters. This paper focuses on the three techniques of letter-based text steganography that have a similar implementation process in covering the hidden message. The three techniques are evaluated using some parameters to obtain the size bit ratio, loading time and validation performance. This parameter used in order to notice that the process of covering the hidden message could be influence capacity of text, the length of time consuming and determine the quality performance in term of validation approach

    Smart cards and the fingerprint: a framework for user identification and authentication

    Get PDF
    Access control has been a great concern in this Information and Communication Technology (ICT) era. The need to control access to certain information and resources has been taken seriously by the ICT community. This research believes that no single security method, algorithm, key or procedure is entirely secure. Hence, a combination of multiple security components is mandatory to provide a high level of protection against fraud and other threats. This research combines two security components, which are the smart card and fingerprint recognition. It looks into the vulnerabilities of magnetic-stripe cards and Personal Identification Numbers (PIN) or passwords widely used in systems today. As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards

    The analysis performance of effectiveness and security metric IT domain

    Get PDF
    The development in information technology (IT) has become a pheunomenem in this era that influences almost aspects of human life. The competitive implementation in developing IT has become concern to enhance the performance system.Therefore, it is important to evaluate the IT implementation in order to discover the performance in achieving a desirable output. This paper concerns about evaluation in terms of effectiveness and security metrics performance. It is because the effectiveness and security is predicted to be able to maintain and improve the develpement performance. The objective of the paper is to discover the importance of effectiveness and security peformances in some of IT domains that could be a concern in evaluation after development process in order to achieve expected performance
    corecore