Preferred Language
Articles
/
VBYBkowBVTCNdQwC4_1_
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embedding of several stages of complexity. Also, LSB method via using the whole image is to increase the security and robustness of the proposed method as compared to state-of the-art methods.

Crossref
View Publication
Publication Date
Sun May 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Color Image Steganography Based on Discrete Wavelet and Discrete Cosine Transforms
...Show More Authors

        The secure data transmission over internet is achieved using Steganography. It is the art and science of concealing information in unremarkable cover media so as not to arouse an observer’s suspicion. In this paper the color cover image is divided into equally four parts, for each part select one channel from each part( Red, or Green, or  Blue), choosing one of these channel depending on the high color ratio in that part. The chosen part is decomposing into four parts {LL, HL, LH, HH} by using discrete wavelet transform. The hiding image is divided into four part n*n then apply DCT on each part. Finally the four DCT coefficient parts embedding in four high frequency sub-bands {HH} in

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Studying Of Image Intensity Distribution Of Elliptical Object (Elliptical Spread Function)
...Show More Authors

      In this work, a new formula of intensity distribution in image plane of elliptical object was founded (Elliptical spread function), by using optical system including circular aperture. The Gauss quadrature method of numerical integral was used for calculating equation's integrals. Curves are shown for system having focal error and intensity distribution in focal axis.  

View Publication Preview PDF
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security & Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Comparison between Different Data Image Compression Techniques Applied on SAR Images
...Show More Authors

In this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.

View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Int. J. Nonlinear Anal. Appl
Adaptive 1-D polynomial coding to compress color image with C421
...Show More Authors

Publication Date
Sat Oct 03 2009
Journal Name
Proceeding Of 3rd Scientific Conference Of The College Of Science
Research Address: New Multispectral Image Classification Methods Based on Scatterplot Technique
...Show More Authors

Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Multiwavelet and Estimation by Interpolation Analysis Based Hybrid Color Image Compression
...Show More Authors

Nowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band  by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained

View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (21)
Crossref (10)
Scopus Crossref