Preferred Language
Articles
/
jih-740
Color Image Steganography Based on Discrete Wavelet and Discrete Cosine Transforms
...Show More Authors

        The secure data transmission over internet is achieved using Steganography. It is the art and science of concealing information in unremarkable cover media so as not to arouse an observer’s suspicion. In this paper the color cover image is divided into equally four parts, for each part select one channel from each part( Red, or Green, or  Blue), choosing one of these channel depending on the high color ratio in that part. The chosen part is decomposing into four parts {LL, HL, LH, HH} by using discrete wavelet transform. The hiding image is divided into four part n*n then apply DCT on each part. Finally the four DCT coefficient parts embedding in four high frequency sub-bands {HH} in cover image. Experiments show that this method gets stego image with perceptual invisibility, and better secrecy. The proposed method was implemented using MATLAB 7.8.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Basrah Journal Of Science
Hiding Three Images at one image by Using Wavelet Coefficients at Color Image
...Show More Authors

Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Oct 07 2020
Journal Name
Journal Of Interdisciplinary Mathematics
Discrete an SIS model with immigrants and treatment
...Show More Authors

In this paper, a discrete SIS epidemic model with immigrant and treatment effects is proposed. Stability analysis of the endemic equilibria and disease-free is presented. Numerical simulations are conformed the theoretical results, and it is illustrated how the immigrants, as well as treatment effects, change current model behavior

View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Mar 24 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh

... Show More
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Linear Feedback Shift Registers-Based Randomization for Image Steganography
...Show More Authors

     Steganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
A new Color image Encryption based on multi Chaotic Maps
...Show More Authors

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF