Corners-based Image Information Hiding Method
Journal Title: Iraqi Journal for Computers and Informatics - Year 2017, Vol 43, Issue 1
Abstract
Abstract: The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method. Advantage of this method over other security methods is hiding existence of data using carrier to hold this data embedding inside it. Image-based information hiding represents one of widely used hiding methods due to the image capability of holding large amount of data as well as its resistance to detectable distortion. In last decades, statistical methods (types of stego-analysis methods) are used to detect existing of hidden data. Therefore, areas that have color variation (edges area) are used to hide data instead of smooth areas. In this paper, Corners points are proposed to hide data instead of edges, this to avoid statistical attacks that are used to expose hidden message. Additionally, this paper proposes clearing least significant bit (CLSB) method to retrieve data from stego-image without sending pixels' map; this will increase security of the proposed cornerbased hiding method. Experimental results show that the proposed method is robust against statistical attacks compared with edge- and sequential-based hiding methods. SVM classifier also confirms the outperformance of the proposed method over the previous methods by using Corel-1000 image dataset.
Authors and Affiliations
Ahmed Talib
Review of Recycling of E-DATA Throuhgt Green Computing
This century has a progressive evolution in IT. New techniques gadgets and tools are being invented every day. This Leeds to consume energy and resources. The planet need a friendly environment in which consuming resourc...
Compression image sharing using DCT- Wavelet transform and coding by Blackely method
: The increased use of computer and internet had been related to the wide use of multimedia information. The requirement for protecting this information has risen dramatically. To prevent the confidential information fro...
Enhance the Hiding Image by Using Compression and Securing Techniques
Information security is a huge trending topic in recent year. Many technique and algorithm were designed and developed to achieve the security of information and/or network across the world. Cryptography is one of the mo...
Corners-based Image Information Hiding Method
Abstract: The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method. Advantage of this...
Design of Secure Chatting Application with End to End Encryption for Android Platform
In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has been proposed. This is achieved by the use of public key cryptography techniques. The proposed applica...