Information hiding technique in digital image using transform domain

Other Title(s)

نظام اخفاء معلومات داخل صوره رقميه استخدام المجال المتحول

Dissertant

al-Ahwal, Ibtisam Salah Salih

Thesis advisor

al-Ajluni, Naim Mahmud

Comitee Members

al-Utaybi, Ghassan
Abu Zitar, Raid
al-Hamus,Sadiq

University

Amman Arab University

Faculty

Collage of Computer Sciences and Informatics

Department

Department of Computer Science

University Country

Jordan

Degree

Master

Degree Date

2007

English Abstract

-Steganography could informally be defined as the “Covered Writing”, where it means concealing a message that is the object of the secure communication.

Steganography has its place in security, and is not intended to replace cryptography.

Steganography is protecting secret messages from detection and/or illegal attack.

The main properties of steganography and/or data hiding are invisibility, complexity, capacity and undetectability.

The thesis presents two techniques for the data hiding in digital image using transform domain, the first technique is similar to conventional methods and it hides one information bit in a randomly selected image block.

The amount of data hidden in this technique is limited by the size of the image, which limits the numbers of random blocks used for the hiding process.

The second technique proposed information hiding in digital image, this technique embeds more than one character in every block.

This block is processed by DCT, and as known every block from the image embeds one bit from the secret message.

Commonly, the character contains one byte equivalent to 8-Bit.

So we tried to increase the data quantity hidden in the image without any distortion and resize the original image, to avoid any doubt.

The size of the secret message does not pose any problem in our system, so the innovative techniques can hide 300 characters, in image size 32×32 which contains 16 blocks only.

To achieve this goal we found that, it was possible to transfer the character from ASCII to float by a special equation then embed this character in middle frequency.

Every image contains different mix from primary color, so the position used to hide characters will be changed every time.

However, the second technique introduces a new concept in which the developed algorithm will hide a number of full characters in each randomly selected block.

The second technique is not similar to the common methods which use the hiding bit Zero/One; called the “Binary” system. This technique gives acceptable results, can be used and is reliable in many life situations which need transmission of secured information.

In both techniques the complete message can be retrieved without any character loss.

Also both techniques were tested for detectability and in both cases they have passed the test.

Main Subjects

Electronic engineering

Topics

No. of Pages

101

Table of Contents

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Data hiding introduction and literature.

Chapter Two : Review steganography science.

Chapter Three : Techniques of information hiding in digital image.

Chapter Four : Experimental results.

Chapter Five : Conclusions and future works.

References.

American Psychological Association (APA)

al-Ahwal, Ibtisam Salah Salih. (2007). Information hiding technique in digital image using transform domain. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-528754

Modern Language Association (MLA)

al-Ahwal, Ibtisam Salah Salih. Information hiding technique in digital image using transform domain. (Master's theses Theses and Dissertations Master). Amman Arab University. (2007).
https://search.emarefa.net/detail/BIM-528754

American Medical Association (AMA)

al-Ahwal, Ibtisam Salah Salih. (2007). Information hiding technique in digital image using transform domain. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-528754

Language

English

Data Type

Arab Theses

Record ID

BIM-528754