Preferred Language
Articles
/
FhZFu4sBVTCNdQwCN9mx
Image Steganography Based on Discrete Wavelet Transform and Chaotic Map, IJSR, Call for Papers, Online Journal
...Show More Authors

'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal

View Publication
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
A steganography based on orthogonal moments
...Show More Authors

View Publication
Scopus (23)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Analyzing Laser Speckle Pattern Using the Discrete Cosine Transform
...Show More Authors

The use of Cosine transform to analyze the model-noise pattern alteration with different vibration model applied on multimode fiber optics are studied. It's results compared with the Fourier transform to perform the same analysis using total frequency difference and the computation time, which almost coincide for the both transforms. A discussion for the results and recommendation are introduced.

View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sat Jul 01 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
An Efficient Cryptosystem for Image Using 1D and 2D Logistic Chaotic Maps
...Show More Authors

View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ieee Access
Hand Gesture Recognition With Acoustic Myography and Wavelet Scattering Transform
...Show More Authors

View Publication Preview PDF
Scopus (11)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Tue Oct 05 2010
Journal Name
Journal Of College Of Education For Women
Conversation Analysis of Forum: a Selected Text from Paul S. Kemp Online Journal
...Show More Authors

Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit

... Show More
Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref