Print ISSN: 1681-6900

Online ISSN: 2412-0758

Keywords : Steganography


An Improved Method for Combine (LSB and MSB) Based on Color Image RGB

Sally A. Mahdi

Engineering and Technology Journal, 2021, Volume 39, Issue 5, Pages 231-242
DOI: 10.30684/etj.2021.168168

Image steganography is the art of hiding data into an image by using the secret key. This paper presents two techniques that combine the most significant bit (MSB) as well as the least significant bit (LSB) based on a color image (24bit for RGB). The presented study proposes a novel method to combine (LSB and MSB) bits based on check MSB values and replace bits from LSB with a secret message. The result of this proposed method that made not affect quality stego -image based on the resulting histogram that shows a match between the cover image and stego- image and more secure because not hidden in all image. The factors were used Mean Square Error (MSE), Compute Payload, in addition to Peak Signal to Noise Ratio (PSNR). The PSNR’s rate is high and MSE is less. The result of this paper when applying on the different image gives high PSNR of 87.141 and less MSE of 0.00012 when inserting message 80 bits and reduction value PSNR of 72.023 and MSE of 0.0040 when inserting message 1200 bits and measure entropy is the same value for cover image and stego –image then this method is more security for the attacker.

Improvement of Image Steganography Using Discrete Wavelet Transform

Manal K. Oudah; Aqeela N. Abed; Rula S. Khudhair; Saad M. Kaleefah

Engineering and Technology Journal, 2020, Volume 38, Issue 1, Pages 83-87
DOI: 10.30684/etj.2021.168178

Recently the Discrete-Wavelet-Transform (DWT) has been represented as signal processing powerful tool to separate the signal into its band frequency components. In this paper, improvement of the steganography techniques by hiding the required message into the suitable frequency band is presented. The results show that the increase of the message length will reduce the Peak Signal to Noise Ratio (PSNR), while the PSNR increases with the increasing the DWT levels. It should be noted that the PSNR reduction was from -13.8278 to -17.77208 when increasing the message length from 161 to 505 characters. In this context, the PSNR is increased from -13.8278 to 7.0554 and from -17.7208 to 1.7901 when the DWT increased from level (1) to level (2).

A New Algorithm for a Steganography System

Atheer Alaa Sabri; Marwa Jaleel Mohsin

Engineering and Technology Journal, 2015, Volume 33, Issue 8, Pages 1955-1970

Steganography is the workmanship and study of concealing mystery information to provide a safe communication between two parties.This paper,displays othersteganographic algorithms for implanting encoded secretimagein grayscale and colorimages to give abnormal state security of information for correspondence over unsecured channels.The proposed algorithms first analyze the secret image using 1level -DWT and SLT respectively. It will be then encrypted the low frequency components of the secret image only using AES method and then embedded in the insensitive mid and high sub-bands gotten from the cover image in the wake of applying 2level- DWT and SLT on it, The embedding method used in this paper is LSB, the resulting image called stego-imageform different algorithms are then compared. .By using the proposed algorithms the capacity of the hidden secret data and stego image quality are improved. The embedding image reaches to half the size of cover image at same time PSNR reach to 62 dB and MSE about 0.36. The language used for testing the algorithms is MATLAB 2013a.

Using a Parser for Steganography Purpose

Suhad M. Kadhem; Abdulraheem A. Abdulraheem

Engineering and Technology Journal, 2015, Volume 33, Issue 4, Pages 654-667

Steganography techniques or information hiding are concerned with hiding the existence of data in other cover media. Usually one hiding method is used to hide secret data in a cover text and that will reduce the security, so in this paper we will use more than one hiding method to hide secret data according to syntax grammars of cover text produced by a special parser.
We represent the Arabic language grammar as logical terms and use B+tree for storing, and Augmented Transition Network) ATN) for parsing.
The proposed technique was implemented using Visual Prolog and after testing according to the authorized measures that are used in this field The proposed approach has provide good security (transparency) for steganography.

Text Hiding Using Artificial Neural Networks

Haider Tarish Haider; Faiq Sabar Baji; Ahmad Saeed Mohammad

Engineering and Technology Journal, 2012, Volume 30, Issue 20, Pages 3553-3564

The growth of information technology and data transfer led to increase the data
attacks, so that information security becomes an important issue to keep the data
saved during information exchanges in computer networks. Steganography
techniques used to protect the information from being detected. The art of
steganography will hide secret information into cover data, which will be sending
without any change so the attack does not recognize any change into cover image.
This paper use the Steganography and artificial neural networks to presents an
information hiding procedure for hiding text in cover image, the secret text will be
converted to binary code, also the cover image will be converted to the binary data
in form of vectors. The supervised learning of neural networks will use binary
patterns of hidden text as set of input values, and the corresponding cover image
data as target that used as teacher signal to neural network. The generated weights
from neural network and the coordinate of data block of cover image have been
saved and then used to extract hidden text data.

Color Images Hiding Based on Wavelet Based Fusion

Saddam Kamil Alwane

Engineering and Technology Journal, 2011, Volume 29, Issue 15, Pages 3158-3171

At present, information is being communicated and proceeds automatically on a large scale. Hence, the required measures for secure storage and transporting of the information are increased. The protection of the information is necessary to guard economic interests, to prevent fraud, to guarantee the privacy of the citizen, etc.
In this paper, a new steganographic system with high capacity is proposed. The proposed algorithm chooses wavelet transform techniques for embedding to achieve a robust system. The main idea of the proposed system is called the wavelet based fusion. In this method, the wavelet decomposition of the cover image and the secret image are merged into a single result called stego-image.

Watermarking in WAV Files Bases on Phase Coding

Salah S. Alrawi; Rasheed Abdulshaheed; Akeel A. Alhadithy

Engineering and Technology Journal, 2011, Volume 29, Issue 4, Pages 770-780

The growth of the network multimedia open the illegal ways for users to use the
digital media without any hindrance or control. This state created, the need for the
copyright protection of various digital media. WAV audio files is one of these media,
these media file format itself has no built in copy protection controls. Other systems
must be used to prevent illegal copying called watermarking. In this paper, we used
the phase coding method to embed the watermark, by using FFT method in two ways.
The first way used the block size of the wave data equal to (22) and the second way
used the block size of the wave data equal to (23).
The results of the above two ways shows that, when we use the first way the
noise of the sound will be very smaller than the results of the second way. On the
other hand the length of the watermark in second way will be longer than when use
the first way. Finally, we can say that the two ways yield good results.

Using B+ Tree To Represent Secret Messages For Steganography Purpose

Suhad M. Kadhem

Engineering and Technology Journal, 2010, Volume 28, Issue 15, Pages 5102-5112

In this research we suggest a new approach by using B+ tree for storing the secret massages (that want to be sent) in a manner that prevent redundancy of these massages or even sub massages in order to provide efficient memory usage . The proposed system includes two stages: Stores the secret message and get its unique code by using B+ tree, and retrieves the unique secret message when we have its code by using B+ tree. The proposed system was implemented using Visual Prolog
5.1 and after testing, the proposed system gives an efficient time in storing and in retrieving the secret messages, also the proposed method solved the ambiguity problem that some steganography methods suffer from.

A New Algorithm for Less Distortion and High Capacity Steganography Model Using Blocks-Based Method

Wathiq L. Abd Ali; Salah Mahdi Saleh

Engineering and Technology Journal, 2010, Volume 28, Issue 13, Pages 2592-2607

Most steganography methods suffer from many problems that effect on
their efficiency and performance. Some of these are the capacity of cover media,
the distortion of cover media, and etc. In this paper we are proposed a new method
to hide audio file (WAV format) in image (BMP format) that overcomes most of
these problems. Also the proposed method aims to meet most the requirements of
any steganography system (like capacity, security and undetectability). It depends
on finding the similarity between the embedded data blocks and others in the
cover-image. It can be used as a powerful tool to get a high capacity data
embedding and a less distortion stego-image, where the PSNR for the stego-image
is large.

Design and Implementation of Secure Public Key Steganography

Ghadah Salim Mouhamad; Alia Karim Abdul Hassan

Engineering and Technology Journal, 2010, Volume 28, Issue 3, Pages 431-444

Several approaches and techniques have been proposed to make
communication via the internet secure; one of these approaches is steganography.
Steganography is the art and science of hiding communication, a steganographic
system thus embeds hidden content in unremarkable cover media so as not to
arouse an eavesdropper’s suspicion. In this research the proposed method is a
public key steganography technique and it embeds a secret message in digital
image with multi level of security. The proposed method uses Discrete Cosine
Transform (DCT) to embed a secret message in Bit Mapped Image Format for
Microsoft Windows (BMP) image with high invisibility and high correlation
between cover-image and stego-image acceptable hiding data rate.

Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3

Mohammed Moanes Ezzaldean Ali; Hanan A. R. Akkar; A. K. M. AL-Shaikhli; Ali K. Shayyish; Muhsin J. Jweeg; Wisam Auday Hussain; Mohammed T. Hussein; Mohammad A. Al-Neami; Farah S. Al-Jabary; Jafar M. Hassan; Ali H. Tarrad; Mohammed N. Abdullah; Ahmed T. Mahdi; Eyad K. Sayhood; Husain M. Husain; Nidaa F. Hassan; Rehab F. Hassan; Akbas E. Ali; Assim H Yousif; Kassim K Abbas; Aqeel M Jary; Shakir A. Salih; Ali T. Jasim; Ammar A. Ali; Hosham Salim; JafarM. Daif; Ali H. Al Aboodi; Ammar S. Dawood; Sarmad A. Abbas; Salah Mahdi Saleh; Roshen T. Ahmed; Aseel B. Al-Zubaidi; Mohammed Y. Hassan; Majid A. Oleiwi; Shaimaa Mahmood Mahdy; Husain M. Husain; Mohammed J. Hamood; Shaima; a Tariq Sakin

Engineering and Technology Journal, 2009, Volume 27, Issue 13, Pages 423-429

The producing composite materials of dual reinforcement in which the matrix material is aluminum reinforced with two types of ceramic particles : which are Alumina (50μm

Keywords

composite materials; wear test ; Al2O3; SiC: Al

Encrypting Audio Data Hiding by Visual Secret Sharing

Nidaa F. Hassan; Rehab F. Hassan; Akbas E. Ali

Engineering and Technology Journal, 2009, Volume 27, Issue 13, Pages 2352-2364

Steganography and cryptography are usually used to ensure information
safety in today’s data communication. This paper makes use of audio
steganography technique and encrypted secret sharing to increases the security level of hidden data. The proposed schema can hide digital data in audio file; the resulted stego audio file is separated then into 2- shares encrypted random secure images, which can be transmitted or distributed separately over an threaten communication channel. Using multilevel of security techniques increases the security level of hidden data, and makes it more robust to attack since secret data
is not hidden in one cover media but it is separated across two images, that they will be encrypted and appear completely random.

Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher

Salah Mahdi Saleh

Engineering and Technology Journal, 2009, Volume 27, Issue 13, Pages 2457-2473

In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete message is divided into blocks with same size according to length of key stream that is generated using nonlinear key generator. This key is used to encrypt the first block in secret message using the stream cipher, whereas the other blocks are encrypted depending on the behavior of cipher block chaining (CBC) mode that turn on the stream cipher in order to
guarantee no duplicated encrypted blocks. In our CBC mode the current ciphertext block will became a key stream to encrypt the next plaintext block, and so on. After encryption stage complete, the encrypted massage are embedded randomly in bmp image using LSB insertion method to increase the security.