A technique for concealing confidential information inside an image over an unsecure network

العناوين الأخرى

تقنية لإخفاء المعلومات السرية داخل صورة بوجود شبكة غير آمنة

مقدم أطروحة جامعية

al-Dahiri, Sad Salih Hassan

مشرف أطروحة جامعية

al-Hamami, Ala Husayn

أعضاء اللجنة

al-Jabir, Ahmad Awdah
al-Mashaqibah, Firas Faris Musa

الجامعة

جامعة عمان العربية

الكلية

كلية العلوم الحاسوبية و المعلوماتية

القسم الأكاديمي

قسم علم الحاسوب

دولة الجامعة

الأردن

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2012

الملخص الإنجليزي

Recently, the need for new methods that offer more privacy and security during transmitting data has widely increased.

In this thesis, a technique that is used in hiding confidential data in image is investigated.

Hiding technique or as called also Steganographic will help in the protection of data during the transmission process.

It depends on the gaps that exist in the human visual and audio systems in which the Least Significant Bit (LSB) of digital images and sound tracks gray levels is modified.

In this thesis three methods are proposed; the first method is to use the cryptography technique for a text message and then embedding the encrypted message in a cover.

The second method is the use of the double hiding.

The third method is useing a chaos-based image encryption system by using tent map.

The embedding methods are different in new techniques, where the LSB method is used in the first method, the chaos-based is used in the second method and 3D Skew Tent Map in the third method.

In the first method, least Significant Bit Replacement Method, image steganography approximately uses all information hiding methods and trys to modify unimportant data in the cover picture.

Least significant bit (LSB) addition is a general, easy approach for inserting data in a cover picture.

Changing LSB doesn’t modify the quality of picture to person observation but this system is sensitive to a selection of picture processing attacks such as compression, cropping and so on.

In the second method, Spatial Domain Steganography utilizing 1-Bit Most Significant Bit (MSB) and chaotic method is used, due to that the steganography has a significant position in protected communication.

In the third method, the proposed scheme uses the 3D skew tent map to mix up the plain-image proficiently in the pixel locations combination procedure, while utilizes the joined map lattice scheme to adjust the gray values of the entire picture pixels significantly.

The behavior investigation involving key space investigation, statistical investigation, strength adjacent to malevolent attacks like cropping, nosing, JPEG compression, are performed numerically and visually.

There is a comparison between the three suggested methods according to some criteria such as: complexity, processing time and security to show their ability in information hiding.

Results obtained from the comparison indicate that the third method is the fastest in terms of time, the best in terms of noise and therefore is the best in terms of security.

التخصصات الرئيسية

الهندسة الكهربائية

الموضوعات

عدد الصفحات

90

قائمة المحتويات

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Literature review.

Chapter Three : Design and analysis.

Chapter Four : Implementation and testing.

Chapter Five : Conclusion and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

al-Dahiri, Sad Salih Hassan. (2012). A technique for concealing confidential information inside an image over an unsecure network. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-526532

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

al-Dahiri, Sad Salih Hassan. A technique for concealing confidential information inside an image over an unsecure network. (Master's theses Theses and Dissertations Master). Amman Arab University. (2012).
https://search.emarefa.net/detail/BIM-526532

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

al-Dahiri, Sad Salih Hassan. (2012). A technique for concealing confidential information inside an image over an unsecure network. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-526532

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-526532