Preferred Language
Articles
/
URb_kYwBVTCNdQwCl_2O
Hiding a Secret Message Encrypted by S-DES Algorithm

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cycle to increases the complexity of the algorithm detection. An additional shared key between the sender and the receiver is added which is applied before starting the encryption process, that key must be hex-decimal in order to increase the level of security and give enough time to delay the guessing of the secret text by the attackers.  The secret message data is concealed using one of the two techniques: either least significant bit (3-LSB) steganography or hiding in green and blue bits. To expedite the concealment process, the cover image is enhanced by applying a median filter, the median filter removes noise from the image while preserving its details. Finally, comparing the results of the two methods to determine which is better for the cover image in terms of PSNR metrics and hiding process time.

Crossref
View Publication
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Hide Secret Messages in Raster Images for Transmission to Satellites using a 2-D Wavelet Packet

     The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Publication Date
Thu May 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography

Steganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography

View Publication Preview PDF
Publication Date
Sat Jan 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
Das Verhaltnis des assimilierten arabischen VIII Stammes zum akkadischen

Das Verhaltnis des assimilierten arabischen VIII Stammes zum akkadischen

View Publication Preview PDF
Publication Date
Sun Jan 01 2006
Journal Name
Journal Of The College Of Languages (jcl)
Analyse der Hauptgestalten in Wielands Roman Geschichte des Agathon

Wielands Hauptwerk die Geschichte des Agathon (1766/73,1794) ist

der wichtigste Roman der Aufklärungsepoche (1720-1785). Die Verlegung der

Handlung in die Antike widerspiegelt die kulturelle Blüte der vorbildhaften Zeit

zwischen 5. und 4. Jhd. v. Chr.

Beim Lesen des Romans findet man unzählige (über 70) Namen aus der

Antike; von Herrschern, Strategen, Philosophen, Dichtern, Künstlern . . . etc,

woüber man unbedingt informiert werden muss, um deren Zusammenhang in der

Geschichte zu verstehen. Vorübergehend erwähnte Personennamen gibt Wieland

meistens als Beispiel für eine Situation oder ein Verhalten. Dies gab mir den

Anstoß, die wichtigsten Figuren

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Audio Hiding in Color Image Using SLT Schemes

As usage of internet grows in different applications around the world, many techniques were developed to guard an important data against from illegal access and modification from unauthorized users by embedding this data into visual media called host media. Audio hiding in an image is a challenge because of the large size of the audio signal. Some previous methods have been presented to reduce the data of the audio signal before embedding it in the cover image, however, these methods was at the cost of reducing the quality of the audio signal. In this paper, a Slantlet transform (SLT) based method is applied to obtain better performance in terms of audio quality. In addition, the data hiding scheme in the cover color image has been imple

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of The College Of Languages (jcl)
La Fragilité des Personnages du Roman DeMme Bovary de Flaubert

Le but de la présente étude est de mettre en lumière la fragilité des personnages dans le roman de "Mme Bovary". En fait, la fragilité n'est pas uniquement propre aux héros de Flaubert. Nous pouvons attribuer cette caractéristique à la plupart des protagonistes du XIXe siècle. Nous pouvons dire qu'aucun auteur n'excelle autant que Flaubert à incarner cette fragilité.

                Flaubert présente un personnage frustré de toute force et de toute volonté comme le personnage d'Emme Bovary.

                Ce personnage n'a pas de confiance en soi, E

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Renaissance des Briefromans Oder Der Alltag in Krisen-und Wendezeiten

In der Nachwendezeit erschienen im deutschen Buchmarkt zahlreiche Werke deutscher Autoren, die einen Trend oder Tendenz markieren können. Im Mittelpunkt der vorliegenden Arbeit steht die Analyse der Struktur und des Inhalts von drei erst nach der Wende erschienen Briefromanen: Alles, alles Liebe (2000) von Barbara Honigmann (geb. 1949), Die Liebenden (2002) von Gerhard Henschel (Jahrgang 1962) und Neue Leben (2005) des im Jahre 1962 geborenen Ingo Schulze. Dieser Beitrag macht sich zur Aufgabe zu erklären, ob der Briefroman ein neuer Trend in der deutschen Literatur nach der Wende ist.

Abstract

In the after( Wende) period a large collection of literary works for  German writers has been p

... Show More
View Publication Preview PDF