Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method
Computer security features for web applications are widely needed in many fields especially in defense industry. Detection phase is the most important aspect in the security development. Detection and investigation is commonly used to identify the suspected evidences from the computer crime. Stegano...
Saved in:
Main Author: | |
---|---|
Format: | Undergraduates Project Papers |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/6976/1/CD7652.pdf http://umpir.ump.edu.my/id/eprint/6976/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Pahang |
Language: | English |
id |
my.ump.umpir.6976 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.69762021-06-11T07:49:46Z http://umpir.ump.edu.my/id/eprint/6976/ Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method Sivasangari, Krishnan HV Social pathology. Social and public welfare Computer security features for web applications are widely needed in many fields especially in defense industry. Detection phase is the most important aspect in the security development. Detection and investigation is commonly used to identify the suspected evidences from the computer crime. Steganography technique become the common approach for detect image based evidence. Previously, encryption technique is applied into image which is trial and error is applied to get precise evidences. This will cause the evidence to be not valid if proceed to the court. In this project steganography is used to get precise set of evidences in order to achieve desired proof to proceed to the court. Based on project, steganography is able to produce the output that precise to the desired output. From the output, the text document saved into computer to produce a solid evidence so that the cases related cybercrime can be proceed to the court. This technique overcomes the problem of trial and error in encryption to get the desired evidences. Steganography with encrypted able to produce a strong security environment in the computer to preserve the confidential and private information. 2013 Undergraduates Project Papers NonPeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/6976/1/CD7652.pdf Sivasangari, Krishnan (2013) Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method. Faculty of Computer System and Software Engineering, Universiti Malaysia Pahang. |
institution |
Universiti Malaysia Pahang |
building |
UMP Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang |
content_source |
UMP Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English |
topic |
HV Social pathology. Social and public welfare |
spellingShingle |
HV Social pathology. Social and public welfare Sivasangari, Krishnan Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method |
description |
Computer security features for web applications are widely needed in many fields especially in defense industry. Detection phase is the most important aspect in the security development. Detection and investigation is commonly used to identify the suspected evidences from the computer crime. Steganography technique become the common approach for detect image based evidence. Previously, encryption technique is applied into image which is trial and error is applied to get precise evidences. This will cause the evidence to be not valid if proceed to the court. In this project steganography is used to get precise set of evidences in order to achieve desired proof to proceed to the court. Based on project, steganography is able to produce the output that precise to the desired output. From the output, the text document saved into computer to produce a solid evidence so that the cases related cybercrime can be proceed to the court. This technique overcomes the problem of trial and error in encryption to get the desired evidences. Steganography with encrypted able to produce a strong security environment in the computer to preserve the confidential and private information. |
format |
Undergraduates Project Papers |
author |
Sivasangari, Krishnan |
author_facet |
Sivasangari, Krishnan |
author_sort |
Sivasangari, Krishnan |
title |
Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method |
title_short |
Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method |
title_full |
Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method |
title_fullStr |
Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method |
title_full_unstemmed |
Hiding and retrieval of text content using discrete cosine transformation (DCT) and tripledes (3Des) method |
title_sort |
hiding and retrieval of text content using discrete cosine transformation (dct) and tripledes (3des) method |
publishDate |
2013 |
url |
http://umpir.ump.edu.my/id/eprint/6976/1/CD7652.pdf http://umpir.ump.edu.my/id/eprint/6976/ |
_version_ |
1703960726161326080 |