- Communities& Collections
- Browse Items by:
- Issue Date
- Author
- Title
- Subject
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.adviser | Gutub, Adnan | en_US |
dc.contributor.author | Alaseri, Khaled Aedh | en_US |
dc.date.accessioned | 2020-02-11T05:33:00Z | - |
dc.date.available | 2020-02-11T05:33:00Z | - |
dc.date.issued | 2019 | en_US |
dc.identifier.uri | https://dorar.uqu.edu.sa/uquui/handle/20.500.12248/116034 | - |
dc.description | 103 paper | en_US |
dc.description.abstract | In this study, the researcher will develop new models to hide data via Arabic text steganography to hide shares generated from target key within texts to help in the retrieval process. The models are built to serve personal remembrance of secret shares to be used within counting-based secret sharing technique. This research hides secret shares adopting humanized remembrance tool to serve uncontrolled assigned shares which are generated from the security system via automatically authentic target key generation process. The shares in their secret sharing process is a challenge that cannot be memorized unlike the normal password assignment that depends fully on personal selection. Therefore, our models secret shares are proposed to be hidden inside the personally chosen texts utilizing improved Arabic text steganography. This steganography models study is based on Kashida extension character used redundantly within Arabic writing text. The research tests our two proposed modifications to original Arabic text steganography all serving secret sharing on the same text database. The comparisons examined the different models on the same benchmark of 40 standard text statements (40 Prophet Hadiths) showing interesting results and promising research contributions. | en_US |
dc.language.iso | عربي | en_US |
dc.publisher | جامعة أم القرى | en_US |
dc.relation.isformatof | مكتبة الملك عبدالله بن عبدالعزيز الجامعية | en_US |
dc.title | Improving steganography for hiding secret sharing | en_US |
dc.title.alternative | A Thesis Submitted to fulfill the partial requirement for the Degree of Masters in Computer Science and Engineering Umm-AL Qura University | en_US |
dc.identifier.callnum | 23288 | - |
dc.type.format | ماجستير | en_US |
dc.publisher.country | المملكة العربية السعودية | en_US |
dc.relation.collage | الحاسب الآلي ونظم المعلومات | en_US |
dc.type.status | مجاز | en_US |
dc.publisher.city | مكة المكرمة | en_US |
dc.date.issuedhijri | 1440 | en_US |
dc.relation.dep | هندسة الحاسب الآلي | en_US |
Appears in Collections : | الرسائل العلمية المحدثة |
Files in This Item :
File | Description | Size | Format | |
---|---|---|---|---|
Improving steganography for hiding secret sharing.pdf " Restricted Access" | الرسالة الكاملة | 4 MB | Adobe PDF | View/OpenRequest a copy |
title.pdf " Restricted Access" | غلاف | 508.12 kB | Adobe PDF | View/OpenRequest a copy |
absa .pdf " Restricted Access" | ملخص الرسالة بالإنجليزي | 5.67 kB | Adobe PDF | View/OpenRequest a copy |
absa.pdf " Restricted Access" | ملخص الرسالة بالعربي | 179.14 kB | Adobe PDF | View/OpenRequest a copy |
indu.pdf " Restricted Access" | المقدمة | 349.13 kB | Adobe PDF | View/OpenRequest a copy |
cont.pdf " Restricted Access" | فهرس الموضوعات | 428.6 kB | Adobe PDF | View/OpenRequest a copy |
Items in D-Library are protected by copyright, with all rights reserved, unless otherwise indicated.
Comments (0)