Print ISSN: 1681-6900

Online ISSN: 2412-0758

Keywords : PSNR

Text File Hiding Randomly Using Secret Sharing Scheme

Yossra H. Ali; Hussein J. Mankhi

Engineering and Technology Journal, 2018, Volume 36, Issue 1B, Pages 1-6
DOI: 10.30684/etj.36.1B.1

Exchange of information through the channels of communication can be
unsafe. Communication media are not safe to send sensitive information so it is
necessary to provide the protection of information from disclosure to unauthorized
persons. This research presented the method to information security is done
through information hiding into the cover image using a least significant bit (LSB)
technique, where a text file is encrypted using a secret sharing scheme. Then,
generating positions to hiding information in a random manner of cover image,
which is difficult to predict hiding in the image-by-image analysis or statistical
analyzes. Where it provides two levels of information security through encryption
of a text file using the secret sharing and the generating random positions of hiding.
This method has been in hiding a text file and recovered without loss of
information, as well as not noticing any deformation of the image. Where it was
hiding a text file size of 20 KB in image cover (250x250) pixels, the result of MSE
is 0.696 and PSNR is 49.211.

A Recursive Algorithm to Hide Three Secret Images In One Image Using Wavelet Transform

Yasmin Muwafaq kassim

Engineering and Technology Journal, 2012, Volume 30, Issue 2, Pages 238-260

This paper presents an algorithm based on wavelet transform to hide three
secret colored or gray-scale images with different sizes in one colored cover
image. The algorithm takes level1 wavelet transformation for the cover image and
level2 wavelet transformation for the coefficients resultant from level1. The
algorithm begins to divide and transpose the secret images into multiple sub bands,
then imbedding them into the coefficient parts resulting from level2. The
embedding depends upon a variable threshold which begins with a very small
value. Here the algorithm ensures the embedding of all the pixels values of the sub
band, if it is not, the operation will be repeated with a larger threshold value until
all the pixels are embedded. Also the pixel's value will not be embedded directly,
the difference between the cover and the secret pixel value will be embedded
instead of it after some manipulation (mathematical operations). All of these
factors (divide and transpose the secret images, the variable threshold for each sub
band and changes on the embedded pixels) increase the robustness and quality of
the algorithm. The resultant stego image and the extracted secret images are very
close to the original one with high PSNR, high Correlation, low Normal Absolute
Error and low Maximum Difference.