Corners-based Image Information Hiding Method
Journal Title: Iraqi Journal for Computers and Informatics - Year 2017, Vol 43, Issue 1
Abstract
Abstract: The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method. Advantage of this method over other security methods is hiding existence of data using carrier to hold this data embedding inside it. Image-based information hiding represents one of widely used hiding methods due to the image capability of holding large amount of data as well as its resistance to detectable distortion. In last decades, statistical methods (types of stego-analysis methods) are used to detect existing of hidden data. Therefore, areas that have color variation (edges area) are used to hide data instead of smooth areas. In this paper, Corners points are proposed to hide data instead of edges, this to avoid statistical attacks that are used to expose hidden message. Additionally, this paper proposes clearing least significant bit (CLSB) method to retrieve data from stego-image without sending pixels' map; this will increase security of the proposed cornerbased hiding method. Experimental results show that the proposed method is robust against statistical attacks compared with edge- and sequential-based hiding methods. SVM classifier also confirms the outperformance of the proposed method over the previous methods by using Corel-1000 image dataset.
Authors and Affiliations
Ahmed Talib
Corners-based Image Information Hiding Method
Abstract: The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method. Advantage of this...
Design of Secure Chatting Application with End to End Encryption for Android Platform
In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has been proposed. This is achieved by the use of public key cryptography techniques. The proposed applica...
Compression image sharing using DCT- Wavelet transform and coding by Blackely method
: The increased use of computer and internet had been related to the wide use of multimedia information. The requirement for protecting this information has risen dramatically. To prevent the confidential information fro...
Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain
Abstract: With development, technology, computer science, computer networks and transmission of multimedia between two or more parts, a security of multimedia becomes an essential issue since most of the systems became e...
Quadcopter Based Object Detection and Localization
Abstract: This paper presents the development and integration of an X-configuration quadcopter with an IP camera for object detection based on the color of an object. A KK2 microcontroller is used to control the quadcopt...