A technique for concealing confidential information inside an image over an unsecure network

Other Title(s)

تقنية لإخفاء المعلومات السرية داخل صورة بوجود شبكة غير آمنة

Dissertant

al-Dahiri, Sad Salih Hassan

Thesis advisor

al-Hamami, Ala Husayn

Comitee Members

al-Jabir, Ahmad Awdah
al-Mashaqibah, Firas Faris Musa

University

Amman Arab University

Faculty

Collage of Computer Sciences and Informatics

Department

Department of Computer Science

University Country

Jordan

Degree

Master

Degree Date

2012

English Abstract

Recently, the need for new methods that offer more privacy and security during transmitting data has widely increased.

In this thesis, a technique that is used in hiding confidential data in image is investigated.

Hiding technique or as called also Steganographic will help in the protection of data during the transmission process.

It depends on the gaps that exist in the human visual and audio systems in which the Least Significant Bit (LSB) of digital images and sound tracks gray levels is modified.

In this thesis three methods are proposed; the first method is to use the cryptography technique for a text message and then embedding the encrypted message in a cover.

The second method is the use of the double hiding.

The third method is useing a chaos-based image encryption system by using tent map.

The embedding methods are different in new techniques, where the LSB method is used in the first method, the chaos-based is used in the second method and 3D Skew Tent Map in the third method.

In the first method, least Significant Bit Replacement Method, image steganography approximately uses all information hiding methods and trys to modify unimportant data in the cover picture.

Least significant bit (LSB) addition is a general, easy approach for inserting data in a cover picture.

Changing LSB doesn’t modify the quality of picture to person observation but this system is sensitive to a selection of picture processing attacks such as compression, cropping and so on.

In the second method, Spatial Domain Steganography utilizing 1-Bit Most Significant Bit (MSB) and chaotic method is used, due to that the steganography has a significant position in protected communication.

In the third method, the proposed scheme uses the 3D skew tent map to mix up the plain-image proficiently in the pixel locations combination procedure, while utilizes the joined map lattice scheme to adjust the gray values of the entire picture pixels significantly.

The behavior investigation involving key space investigation, statistical investigation, strength adjacent to malevolent attacks like cropping, nosing, JPEG compression, are performed numerically and visually.

There is a comparison between the three suggested methods according to some criteria such as: complexity, processing time and security to show their ability in information hiding.

Results obtained from the comparison indicate that the third method is the fastest in terms of time, the best in terms of noise and therefore is the best in terms of security.

Main Subjects

Electronic engineering

Topics

No. of Pages

90

Table of Contents

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Literature review.

Chapter Three : Design and analysis.

Chapter Four : Implementation and testing.

Chapter Five : Conclusion and future work.

References.

American Psychological Association (APA)

al-Dahiri, Sad Salih Hassan. (2012). A technique for concealing confidential information inside an image over an unsecure network. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-526532

Modern Language Association (MLA)

al-Dahiri, Sad Salih Hassan. A technique for concealing confidential information inside an image over an unsecure network. (Master's theses Theses and Dissertations Master). Amman Arab University. (2012).
https://search.emarefa.net/detail/BIM-526532

American Medical Association (AMA)

al-Dahiri, Sad Salih Hassan. (2012). A technique for concealing confidential information inside an image over an unsecure network. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-526532

Language

English

Data Type

Arab Theses

Record ID

BIM-526532