Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri
In the era of technology, massive amount of data have been stored and exchanged over the internet. One of the most important factors of data communication has been the security of the credential information. Cryptography is a technique for securing the secrecy of the information. Many different tech...
Main Authors: | Ahmad Zukri, Nurul Hidayah, Kamarudin, Nur Khairani, Izraf Ishak, Mohd Enif, Md Rashid, Nor Aimuni |
---|---|
Format: | Article |
Language: | English |
Published: |
Universiti Teknologi Mara Cawangan Pulau Pinang
2018
|
Subjects: | |
Online Access: | http://ir.uitm.edu.my/id/eprint/28897/ http://ir.uitm.edu.my/id/eprint/28897/ http://ir.uitm.edu.my/id/eprint/28897/1/AJ_NURUL%20HIDAYAH%20AHMAD%20ZUKRI%20EAJ%2018.pdf |
Similar Items
-
The art of intrusion the real stories behind the exploits of hackers, intruders and deceivers
by: Mitnick
Published: (2005) -
Hack proofing your web applications the only way to stop a hacker is to think like one
Published: (2001) -
Hacker's challenge test your incident response skills using 20 scenarios
by: Schiffman
Published: (2001) -
Major issues in the development of a Hacker's Code of Ethics / Ahmad Hafidz Baharom Alam Shah
by: Baharom Alam Shah, Ahmad Hafidz
Published: (2005) -
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019)