Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/13638
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVictor, Onomza Waziri-
dc.contributor.authorAudu, Isah-
dc.contributor.authorAbraham, Ochoche-
dc.contributor.authorShafi’i, Muhammad Abulhamid-
dc.date.accessioned2021-08-18T16:51:36Z-
dc.date.available2021-08-18T16:51:36Z-
dc.date.issued2012-11-
dc.identifier.issn2279 – 0764-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/13638-
dc.description.abstractThis paper reviews the concept of Cryptography and Steganography and their differences are classified as a way of passing. The essence of steganography as an art of hiding information was examined using the wavelet approach. The algorithms developed and exhibited in block diagrams were experimentally examined with encrypted message and disseminated abstractedly over the Internet with the belief that the stego-image carrying the message would not be discovered by unauthenticated person.en_US
dc.publisherInternational Journal of Computer and Information Technologyen_US
dc.relation.ispartofseriesVolume 01– Issue 02;194-202-
dc.subjectCryptographyen_US
dc.subjectSteganographyen_US
dc.subjectSteganalysisen_US
dc.subjectStego-Imageen_US
dc.subjectWaveleten_US
dc.subjectVoIPen_US
dc.subjectsteganogramen_US
dc.subjectCommunication Securityen_US
dc.subjectSecret Key Cryptographyen_US
dc.titleSteganography and Its Applications in Information Dessimilation on the Web Using Images as SecurityEmbeddment: A Wavelet Approachen_US
dc.typeArticleen_US
Appears in Collections:Statistics

Files in This Item:
File Description SizeFormat 
Steganography and its Applications.pdf416.62 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.