首页    期刊浏览 2024年08月30日 星期五
登录注册

文章基本信息

  • 标题:SECURITY METHOD FOR COMBINATION STEGANOGRAPHY ALGORITHMS ON TRANSFORM DOMAIN FOR JPEG IMAGES
  • 本地全文:下载
  • 作者:Hamdan L. Jaheel ; Zou Beiji
  • 期刊名称:International Journal on Smart Sensing and Intelligent Systems
  • 印刷版ISSN:1178-5608
  • 出版年度:2014
  • 卷号:7
  • 期号:4
  • 页码:1962-1979
  • 出版社:Massey University
  • 摘要:Steganography is the act of hiding a message inside another message in such a way that can only be detected by its intended recipient. In any communication, security is the most important issue in the world today. It created a lot of data security and steganography algorithms in the past decade, and that worked motivation for our research. In this paper, Security Method for Combination Steganography Algorithms on Transform domain for JPEG images, we have designed a system that will allow the average user to securely transfer secret messages (picture) securely by hiding them in JPEG image file using local characteristics within the image. This paper is a combination of two steganography algorithms, which provide a strong backbone for its security. The proposed system hides the image unrevealed manner through the use of steganography algorithms to protect each other, where was used F4 algorithm as a wall to protect outguess01 algorithm. We combine between steganography algorithms (outguess 0.1 algorithm and F4 algorithm) to make use of it to provide more than level of protection for the secret message (image). When save the secret message (image) within an image by using outguess01 algorithm, Which produces outguess-image, then hide outguess-image within another image by using F4algorithm, Which produces F4-image(stego image). Adopt the principle of camouflage and deception to hide image gives another level of safety for secret Image. Good selection of size and type images used in the process of concealment that contributed to the success of the process of embedded and retrieval of hidden images. Results proved after calculating the capacity and PSNR for images that a good and acceptable steganography scheme. The model presented here is based on JPEG images.
国家哲学社会科学文献中心版权所有