معلومات البحث الكاملة في مستودع بيانات الجامعة

عنوان البحث(Papers / Research Title)


Steganography Using Fractal Images Technique


الناشر \ المحرر \ الكاتب (Author / Editor / Publisher)

 
توفيق عبد الخالق عباس الاسدي

Citation Information


توفيق,عبد,الخالق,عباس,الاسدي ,Steganography Using Fractal Images Technique , Time 17/06/2014 06:49:19 : كلية تكنولوجيا المعلومات

وصف الابستركت (Abstract)


Steganography Using Fractal Images Technique

الوصف الكامل (Full Abstract)

 
 
Steganography Using Fractal Images Technique

 Prof. Dr. Tawfiq Abdulkhaleq Abbas 1, Hassanein Karim Hamza 2

 1(Collage of Information Technology, Babylon University, Iraq)
 2(Collage of Information Technology, Babylon University, Iraq)


Abstract: -

 In this paper, we suggest a new system and effective method for hiding an information in an image by detecting features of the regions of the cover image depending on applying fractal technique on the cover image and then choose the regions that will be hiding within it by using an algorithm determines regions that are fractal in which will be hiding, the fractal technique can be used to hide maximum amount of data in an image without degrading its quality and to make the hidden data robust enough to withstand image processing which do not change the appearance of image.

 Keywords: - Steganography, Digital watermarking, Information Hiding, Information Security, Data Hiding, Cover image, Stego image, Fractal, PIFS, Quadtree, Range, Domain.

I. INTRODUCTION:-

Information security plays an important role in all aspects of life, in particular the protection of an organization s valuable resources, such as information, hardware, and software. Therefore, information security is defined as a process of protecting data from unauthorized access, use, disclosure, destruction, modification, or disruption. As no single formula can guarantee full security, there is a need for a set of benchmarks or standards to help ensure an adequate level of security is attained, resources are used efficiently, and the best security practices are adopted [1]. Communication security should not be based on the secrecy of the communication method used. Various cryptosystems have been used to assure the security of transmitted data. In such systems, data is encrypted before transmission and they have been considered as secure systems [2]. There are many ways to provide the security for information and information systems like information hiding (steganography and watermarking), biometric indicators, passwords, and cryptography each one of them has some strong aspects and weak sides [3]. Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the communicated information.[4]. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication, but it is not the only means of providing information security. In practice, crypto is used to keep secrets secret. It transforms information in such a way that no one other than the intended recipients can read what was actually written [5][6]. Cryptography is based on keys. Secure storage of keys is a crucial non-trivial task. Key management often is the weakest point of many systems [7]. Cryptographic methods are not sufficient to solve all data security related issues. Steganography is the art of hiding information in ways that prevent the detection of hidden messages [8].


Dear visitor,
For downloading the full version of the research/article click on the pdf icon above.

تحميل الملف المرفق Download Attached File

تحميل الملف من سيرفر شبكة جامعة بابل (Paper Link on Network Server) repository publications

البحث في الموقع

Authors, Titles, Abstracts

Full Text




خيارات العرض والخدمات


وصلات مرتبطة بهذا البحث