Please use this identifier to cite or link to this item:
http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/13638
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Victor, Onomza Waziri | - |
dc.contributor.author | Audu, Isah | - |
dc.contributor.author | Abraham, Ochoche | - |
dc.contributor.author | Shafi’i, Muhammad Abulhamid | - |
dc.date.accessioned | 2021-08-18T16:51:36Z | - |
dc.date.available | 2021-08-18T16:51:36Z | - |
dc.date.issued | 2012-11 | - |
dc.identifier.issn | 2279 – 0764 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/13638 | - |
dc.description.abstract | This paper reviews the concept of Cryptography and Steganography and their differences are classified as a way of passing. The essence of steganography as an art of hiding information was examined using the wavelet approach. The algorithms developed and exhibited in block diagrams were experimentally examined with encrypted message and disseminated abstractedly over the Internet with the belief that the stego-image carrying the message would not be discovered by unauthenticated person. | en_US |
dc.publisher | International Journal of Computer and Information Technology | en_US |
dc.relation.ispartofseries | Volume 01– Issue 02;194-202 | - |
dc.subject | Cryptography | en_US |
dc.subject | Steganography | en_US |
dc.subject | Steganalysis | en_US |
dc.subject | Stego-Image | en_US |
dc.subject | Wavelet | en_US |
dc.subject | VoIP | en_US |
dc.subject | steganogram | en_US |
dc.subject | Communication Security | en_US |
dc.subject | Secret Key Cryptography | en_US |
dc.title | Steganography and Its Applications in Information Dessimilation on the Web Using Images as SecurityEmbeddment: A Wavelet Approach | en_US |
dc.type | Article | en_US |
Appears in Collections: | Statistics |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Steganography and its Applications.pdf | 416.62 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.