An Improved Method for Combine (LSB and MSB) Based on Color Image RGB
An Improved Method for Combine (LSB and MSB) Based on Color Image RGB

Sally A. Mahdi

Volume 39, 1B , March 2021, , Page 231-242

https://doi.org/10.30684/etj.v39i1B.1574

Abstract
  Image steganography is the art of hiding data into an image by using the secret key. This paper presents two techniques that combine the most significant bit (MSB) as well as the least ...  Read More ...
A New Proposed Coding Method for Steganography Purpose
A New Proposed Coding Method for Steganography Purpose

Suhad M. Kadhem

Volume 39, 1B , March 2021, , Page 243-251

https://doi.org/10.30684/etj.v39i1B.1510

Abstract
  Transferring data in a safe way is one of the things that have been of interest since ancient times. Data hiding or steganography is a method used to protect the data during its transmission. ...  Read More ...
Improvement of Image Steganography Using Discrete Wavelet Transform
Improvement of Image Steganography Using Discrete Wavelet Transform

Manal K. Oudah; Aqeela N. Abed; Rula S. Khudhair; Saad M. Kaleefah

Volume 38, 1A , January 2020, , Page 83-87

https://doi.org/10.30684/etj.v38i1A.266

Abstract
  Recently the Discrete-Wavelet-Transform (DWT) has been represented as signal processing powerful tool to separate the signal into its band frequency components. In this paper, improvement ...  Read More ...
Hiding 9 Gray Images In RGB Image and Using Filters For Noise Removing
Hiding 9 Gray Images In RGB Image and Using Filters For Noise Removing

Haraa R. Hatem

Volume 36, 11A , November 2018, , Page 1144-1147

https://doi.org/10.30684/etj.36.11A.2

Abstract
  This paper shows two major techniques, the first is steganography and the second is filters. Gaussian and median filters are used to enhance the quality of image and remove the noise. ...  Read More ...
Information Hiding Using Geographic Information System (GIS) Vector File
Information Hiding Using Geographic Information System (GIS) Vector File

R.F. Hassan; M.S. Mohammed

Volume 35, 2B , February 2017, , Page 182-188

https://doi.org/10.30684/etj.2017.138666

Abstract
  There are different techniques for securing data like cryptography and information hiding (steganography and watermarking) which has received more attention and faced many challenges. ...  Read More ...
A New Algorithm for a Steganography System
A New Algorithm for a Steganography System

Atheer Alaa Sabri; Marwa Jaleel Mohsin

Volume 33, 8A , October 2015, , Page 1955-1970

https://doi.org/10.30684/etj.2015.108835

Abstract
  Steganography is the workmanship and study of concealing mystery information to provide a safe communication between two parties.This paper,displays othersteganographic algorithms for ...  Read More ...
Using a Parser for Steganography Purpose
Using a Parser for Steganography Purpose

Suhad M. Kadhem; Abdulraheem A. Abdulraheem

Volume 33, 4B , April 2015, , Page 654-667

https://doi.org/10.30684/etj.33.4B.9

Abstract
  Steganography techniques or information hiding are concerned with hiding the existence of data in other cover media. Usually one hiding method is used to hide secret data in a cover ...  Read More ...
Text Hiding Using Artificial Neural Networks
Text Hiding Using Artificial Neural Networks

Haider Tarish Haider; Faiq Sabar Baji; Ahmad Saeed Mohammad

Volume 30, Issue 20 , December 2012, , Page 3553-3564

https://doi.org/10.30684/etj.30.20.6

Abstract
  The growth of information technology and data transfer led to increase the data attacks, so that information security becomes an important issue to keep the data saved during information ...  Read More ...
Hiding Encrypted Color Image within MPEG-2 Video
Hiding Encrypted Color Image within MPEG-2 Video

Firas A. Abdul Latef; Alaa A. Abdul Latef

Volume 30, Issue 4 , February 2012, , Page 605-614

https://doi.org/10.30684/etj.30.4.7

Abstract
  In any communication, security is the most important issue in today’s world. Lots of data security and data hiding algorithms have been developed in the last decade. Hiding data ...  Read More ...
Color Images Hiding Based on Wavelet Based Fusion
Color Images Hiding Based on Wavelet Based Fusion

Saddam Kamil Alwane

Volume 29, Issue 15 , November 2011, , Page 3158-3171

https://doi.org/10.30684/etj.29.15.10

Abstract
  At present, information is being communicated and proceeds automatically on a large scale. Hence, the required measures for secure storage and transporting of the information are increased. ...  Read More ...
Steganograhy in Images by Using Intersecting Planes
Steganograhy in Images by Using Intersecting Planes

Esraa Jaffar Baker

Volume 29, Issue 7 , May 2011, , Page 1265-1275

https://doi.org/10.30684/ etj.29.7.4

Abstract
  Steganography is the art of hiding, and transmitting information using apparently innocent carrier without expose any suspicion. In this paper the proposed system is an implementation ...  Read More ...
Watermarking in WAV Files Bases on Phase Coding
Watermarking in WAV Files Bases on Phase Coding

Salah S. Alrawi; Rasheed Abdulshaheed; Akeel A. Alhadithy

Volume 29, Issue 4 , March 2011, , Page 770-780

https://doi.org/10.30684/ etj.29.4.11

Abstract
  The growth of the network multimedia open the illegal ways for users to use the digital media without any hindrance or control. This state created, the need for the copyright protection ...  Read More ...
Using B+ Tree To Represent Secret Messages For Steganography Purpose
Using B+ Tree To Represent Secret Messages For Steganography Purpose

Suhad M. Kadhem

Volume 28, Issue 15 , July 2010, , Page 5102-5112

https://doi.org/10.30684/etj.28.15.18

Abstract
  In this research we suggest a new approach by using B+ tree for storing the secret massages (that want to be sent) in a manner that prevent redundancy of these massages or even sub ...  Read More ...
A New Algorithm for Less Distortion and High Capacity Steganography Model Using Blocks-Based Method
A New Algorithm for Less Distortion and High Capacity Steganography Model Using Blocks-Based Method

Wathiq L. Abd Ali; Salah Mahdi Saleh

Volume 28, Issue 13 , June 2010, , Page 2592-2607

https://doi.org/10.30684/etj.28.13.7

Abstract
  Most steganography methods suffer from many problems that effect ontheir efficiency and performance. Some of these are the capacity of cover media,the distortion of cover media, and ...  Read More ...
Design and Implementation of Secure Public Key Steganography
Design and Implementation of Secure Public Key Steganography

Ghadah Salim Mouhamad; Alia Karim Abdul Hassan

Volume 28, Issue 3 , January 2010, , Page 431-444

https://doi.org/10.30684/etj.28.3.1

Abstract
  Several approaches and techniques have been proposed to makecommunication via the internet secure; one of these approaches is steganography.Steganography is the art and science of hiding ...  Read More ...
Using Fractals in Information Hiding
Using Fractals in Information Hiding

Nadia M. Al-Saidie; Thanaa A. Kadhim

Volume 27, Issue 16 , December 2009, , Page 3093-3111

https://doi.org/10.30684/etj.27.16.15

Abstract
  Fractals are generated by simple, recursive calculations. Encryption anddecryption algorithms that take advantage of fractals are developed. This paper presents a new approach for information ...  Read More ...
Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3
Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3

Mohammed Saeed. Waheed; Hassan Hamed. Abed

Volume 27, Issue 13 , September 2009, , Page 423-429

https://doi.org/10.30684/etj.27.13.19

Abstract
  The producing composite materials of dual reinforcement in which the matrix material is aluminum reinforced with two types of ceramic particles : which are Alumina (50μmKeywordscomposite ...  Read More ...
Encrypting Audio Data Hiding by Visual Secret Sharing
Encrypting Audio Data Hiding by Visual Secret Sharing

Nidaa F. Hassan; Rehab F. Hassan; Akbas E. Ali

Volume 27, Issue 13 , September 2009, , Page 2352-2364

https://doi.org/10.30684/etj.27.13.8

Abstract
  Steganography and cryptography are usually used to ensure informationsafety in today’s data communication. This paper makes use of audiosteganography technique and encrypted secret ...  Read More ...
Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher
Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher

Salah Mahdi Saleh

Volume 27, Issue 13 , September 2009, , Page 2457-2473

https://doi.org/10.30684/etj.27.13.14

Abstract
  In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete ...  Read More ...