Design and implementation of secure data system using steganography

مقدم أطروحة جامعية

al-Sayyid, Babikir Abd al-Rahman Uthman

مشرف أطروحة جامعية

Ahmad, Uthman Muhammad Daf Allah

أعضاء اللجنة

Abu Zayd, Uthman Haydar
Ahmad, Sami Muhammad
Abu al-Mally, Imam

الجامعة

جامعة أم درمان الإسلامية

الكلية

كلية العلوم الهندسية

القسم الأكاديمي

قسم الهندسة الكهربائية و الإلكترونية

دولة الجامعة

السودان

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2009

الملخص الإنجليزي

Information hiding is a process used to embed data into various forms of media such as image, audio, or text.

The embedded data must be invisible and inaudible to unauthorized persons so that the hidden message can't be extracted from the media.

A new approach of steganography is being introduced in this thesis.

The proposed system uses image frame to embed its secret message implementing by Matlab7.0 packages.

The image frame contains unnecessary data that can be replaced by the secret message in order to build the stego_image which is sent to the receiver.

The receiver does not need the cover image to extract secret message, this will decrease the amount of information which is needed on the receiver side and this will increase the security of the proposed system., In order to increase the complexity of security for the hiding message, an additional encryption security layer should be added to the proposed system so that the secret message should be encrypted before being hidden by steganography process.

A basic algorithm has been developed for implementing steganography supported by different standard types of image file format.

The proposed system gives acceptable results (40 experiments test) compatible with the international standard for the Steganography performance such as peak signal to noise ratio (PSNR) and mean square error (MSE).

التخصصات الرئيسية

الرياضيات

الموضوعات

عدد الصفحات

113

قائمة المحتويات

Table of contents.

Abstract.

Chapter One : Introduction.

Chapter Two : Information security concepts.

Chapter Three : Steganography techniques.

Chapter Four : System design and implementation.

Chapter Five : Results and conclusions.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

al-Sayyid, Babikir Abd al-Rahman Uthman. (2009). Design and implementation of secure data system using steganography. (Master's theses Theses and Dissertations Master). Omdurman Islamic University, Sudan
https://search.emarefa.net/detail/BIM-364352

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

al-Sayyid, Babikir Abd al-Rahman Uthman. Design and implementation of secure data system using steganography. (Master's theses Theses and Dissertations Master). Omdurman Islamic University. (2009).
https://search.emarefa.net/detail/BIM-364352

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

al-Sayyid, Babikir Abd al-Rahman Uthman. (2009). Design and implementation of secure data system using steganography. (Master's theses Theses and Dissertations Master). Omdurman Islamic University, Sudan
https://search.emarefa.net/detail/BIM-364352

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-364352