Secured and robust information hiding scheme

N. H. Abdul-Mahdi, A. Yahya, R. B. Ahmad, O. M. Al-Qershi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)


The sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have exerted much of their time and efforts in an attempt to find suitable ways for data hiding. As a case in point is the development of steganography, a technique used for hiding the important information imperceptibly. As far as the present work is concerned, the researcher adopts the steganography system for the purpose of embedding secret data within the frequency domain. Such a step can be done by modifying the DCT coefficients in a content-based manner, so that the embedding map will be able to easily identify the embedding blocks; a matter which in turn helps recover the data hidden in the frequency domain. The arrived at results reflected the manageability of the system to fight against AWGN and JPEG compression attacks and a high quality stego-images. However, being only part of an image is used for the purpose of hiding data has limited the capacity of the system in this regards.

Original languageEnglish
Title of host publicationMalaysian Technical Universities Conference on Engineering and Technology 2012, MUCET 2012
PublisherElsevier Ltd
Number of pages9
ISBN (Print)9781627486347
Publication statusPublished - 2013
Event2012 Malaysian Technical Universities Conference on Engineering and Technology, MUCET 2012 - Kangar, Perlis, Malaysia
Duration: Nov 20 2012Nov 21 2012

Publication series

NameProcedia Engineering
ISSN (Print)1877-7058


Other2012 Malaysian Technical Universities Conference on Engineering and Technology, MUCET 2012
CityKangar, Perlis

All Science Journal Classification (ASJC) codes

  • General Engineering


Dive into the research topics of 'Secured and robust information hiding scheme'. Together they form a unique fingerprint.

Cite this