M.Z.I. Shamsuddin's research while affiliated with Universiti Teknologi Malaysia and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (1)


Figure 2.2 Producing Stego-Image Process  
Figure 3.9 Stego-Image using Black Image  
Figure 3.6 Basic LSB with sequence-mapping  
Figure 3.3 A Message Open with Notepad  
Figure 3.7 Recovered Message with Normal Extraction  
Information hiding using steganography
  • Conference Paper
  • Full-text available

February 2003

·

6,627 Reads

·

188 Citations

M.M. Amin

·

·

·

[...]

·

M.Z.I. Shamsuddin

Due to advances in ICT, most information is kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, steganography can be employed to secure information. Steganography is a technique of hiding information in digital media. In contrast to cryptography, the message or encrypted message is embedded in a digital host before passing it through the network, thus the existence of the message is unknown. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media: audio, video, and images.

Download
Share

Citations (1)


... Similar to adversarial attack, information hiding is the embedding of secret information by modifying the input signal, which can be divided into digital watermarking [33,40], steganography and steganalysis [1,20], and reversible information hiding [23,37]. Reversible information hiding is of particular interest because it can recover host signals without distortion. ...

Reference:

Reversible attack based on local visible adversarial perturbation
Information hiding using steganography