Print ISSN: 1681-6900

Online ISSN: 2412-0758

Keywords : Hidden information


Improvement of Image Steganography Using Discrete Wavelet Transform

Manal K. Oudah; Aqeela N. Abed; Rula S. Khudhair; Saad M. Kaleefah

Engineering and Technology Journal, 2020, Volume 38, Issue 1, Pages 83-87
DOI: 10.30684/etj.2021.168178

Recently the Discrete-Wavelet-Transform (DWT) has been represented as signal processing powerful tool to separate the signal into its band frequency components. In this paper, improvement of the steganography techniques by hiding the required message into the suitable frequency band is presented. The results show that the increase of the message length will reduce the Peak Signal to Noise Ratio (PSNR), while the PSNR increases with the increasing the DWT levels. It should be noted that the PSNR reduction was from -13.8278 to -17.77208 when increasing the message length from 161 to 505 characters. In this context, the PSNR is increased from -13.8278 to 7.0554 and from -17.7208 to 1.7901 when the DWT increased from level (1) to level (2).

Random Insertion Watermarking By Computing Angle Between Two Lines In Blue Components On Postage Stamp

Nada Mahdi al- Husseiny

Engineering and Technology Journal, 2011, Volume 29, Issue 7, Pages 1308-1328

This paper presents a new approach for watermarking by using geometric analytic
and mathematical model providing robustness to embed the watermarking in postage
stamp (ps) image, using the angle between two lines to insert the embedded
information in blue component for pixels. Analytic geometry, also known as
coordinate geometry, or Cartesian geometry, is the study of geometry using a
coordinate system and analysis. The modern and advanced meaning refers to the
geometry of analytic varieties, to develop a data-hiding method that has a good
performance in color images. Furthermore, the watermark must be either robust or
fragile; depending on the application. The expression "robust" in this paper refers to
the capability of the watermark to resist manipulations of the media. Two types of
watermarked attack was used; the JEPQ compression as lossy compression (where
compressing and decompressing data retrieve hidden information that may be close
enough to the original image), and the enhancement filter (mean filter). This proposed
watermarking system refers to the watermark objective evaluation test or (WOET).