Please use this identifier to cite or link to this item: http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/12301
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWaziri, Victor Onomza-
dc.contributor.authorIsah, Audu-
dc.contributor.authorOchoche, Abraham-
dc.contributor.authorAbdulhamid, Shafi’i Muhammad-
dc.date.accessioned2021-08-03T06:37:34Z-
dc.date.available2021-08-03T06:37:34Z-
dc.date.issued2012-07-20-
dc.identifier.issn2279 – 0764-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/12301-
dc.description.abstractThis paper reviews the concept of Cryptography and Steganography and their differences are classified as a way of passing. The essence of steganography as an art of hiding information was examined using the wavelet approach. The algorithms developed and exhibited in block diagrams were experimentally examined with encrypted message and disseminated abstractedly over the Internet with the belief that the stego-image carrying the message would not be discovered by unauthenticated person.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Computer and Information Technology (IJCIT)en_US
dc.relation.ispartofseries1 (2), 192-202;-
dc.subjectryptographyen_US
dc.subjectCryptographyen_US
dc.subjectSecret Keyen_US
dc.subjectSteganographyen_US
dc.titleSteganography and Its Applications in Information Dessimilation on the Web Using Images as Security Embeddment: A Wavelet Approachen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
44.pdfSteganography and Its Applications in Information Dessimilation on the Web Using Images as Security Embeddment: A Wavelet Approach505.79 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.