An Enhanced Steganographic Model Based on DWT Combined with Encryption and Error Correction Techniques
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 12
Abstract
The problem of protecting information, modification, privacy and origin validation are very important issues and became the concern of many researchers. Handling these problems definitely is a big challenge and this is probably why so much attention directed to the development of information protection schemes. In this paper, we propose a robust model that combines and integrates steganographic techniques with encryption, and error detection and correction techniques in order achieve secrecy, authentication and integrity. The idea of applying these techniques is based on decomposing the image into three separate color planes Red, Green and Blue and then depending on the encryption key we divide the image into N blocks. By applying DWT on each block independently, this model enables hiding the information in the image in an unpredictable manner. The part of the image where information embedded is a key depended and unknown to the intruder and by this we achieve blinded DWT effect. To enhance reliability the proposed model that uses hamming code which helps to recover lost or modified information. The proposed Model implemented and tested successfully.
Authors and Affiliations
Dr. Adwan Yasin, Mr. Nizar Shehab, Dr. Muath Sabha, Mariam Yasin
Recurrence Relation for Projectile Simulation Project and Game based Learning
Huge Gap has been observed on study of projectile simulation models relating it to speed of camera or frame per seconds. The objective of this paper is to explore and investigate time driven simulation models to mimic pr...
Awareness Training Transfer and Information Security Content Development for Healthcare Industry
Electronic Health Record (EHR) becomes increasingly pervasive and the need to safeguard EHR becomes more vital for healthcare organizations. Human error is known as the biggest threat to information security in Electroni...
Electronic Health as a Component of G2C Services
This paper explores electronic health as a segment of electronic government. International practice in electronic health field and electronic health strategies adopted in Europe are analysed. Current practices in deliver...
Improving Recommendation Techniques by Deep Learning and Large Scale Graph Partitioning
Recommendation is very crucial technique for social networking sites and business organizations. It provides suggestions based on users’ personalized interest and provide users with movies, books and topics links that wo...
EEG Signals based Brain Source Localization Approaches
This article is focused on the overview of functionality of the neurons and investigation of the current research and algorithms used for brain source localization. The human brain is made up of active neurons and contin...