Design and implementation of secure data system using steganography

Dissertant

al-Sayyid, Babikir Abd al-Rahman Uthman

Thesis advisor

Ahmad, Uthman Muhammad Daf Allah

Comitee Members

Abu Zayd, Uthman Haydar
Ahmad, Sami Muhammad
Abu al-Mally, Imam

University

Omdurman Islamic University

Faculty

Faculty of Engineering

Department

Department of Electrical and Electronics Engineering

University Country

Sudan

Degree

Master

Degree Date

2009

English Abstract

Information hiding is a process used to embed data into various forms of media such as image, audio, or text.

The embedded data must be invisible and inaudible to unauthorized persons so that the hidden message can't be extracted from the media.

A new approach of steganography is being introduced in this thesis.

The proposed system uses image frame to embed its secret message implementing by Matlab7.0 packages.

The image frame contains unnecessary data that can be replaced by the secret message in order to build the stego_image which is sent to the receiver.

The receiver does not need the cover image to extract secret message, this will decrease the amount of information which is needed on the receiver side and this will increase the security of the proposed system., In order to increase the complexity of security for the hiding message, an additional encryption security layer should be added to the proposed system so that the secret message should be encrypted before being hidden by steganography process.

A basic algorithm has been developed for implementing steganography supported by different standard types of image file format.

The proposed system gives acceptable results (40 experiments test) compatible with the international standard for the Steganography performance such as peak signal to noise ratio (PSNR) and mean square error (MSE).

Main Subjects

Mathematics

Topics

No. of Pages

113

Table of Contents

Table of contents.

Abstract.

Chapter One : Introduction.

Chapter Two : Information security concepts.

Chapter Three : Steganography techniques.

Chapter Four : System design and implementation.

Chapter Five : Results and conclusions.

References.

American Psychological Association (APA)

al-Sayyid, Babikir Abd al-Rahman Uthman. (2009). Design and implementation of secure data system using steganography. (Master's theses Theses and Dissertations Master). Omdurman Islamic University, Sudan
https://search.emarefa.net/detail/BIM-364352

Modern Language Association (MLA)

al-Sayyid, Babikir Abd al-Rahman Uthman. Design and implementation of secure data system using steganography. (Master's theses Theses and Dissertations Master). Omdurman Islamic University. (2009).
https://search.emarefa.net/detail/BIM-364352

American Medical Association (AMA)

al-Sayyid, Babikir Abd al-Rahman Uthman. (2009). Design and implementation of secure data system using steganography. (Master's theses Theses and Dissertations Master). Omdurman Islamic University, Sudan
https://search.emarefa.net/detail/BIM-364352

Language

English

Data Type

Arab Theses

Record ID

BIM-364352