TY - GEN
T1 - Secured and robust information hiding scheme
AU - Abdul-Mahdi, N. H.
AU - Yahya, A.
AU - Ahmad, R. B.
AU - Al-Qershi, O. M.
PY - 2013
Y1 - 2013
N2 - The sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have exerted much of their time and efforts in an attempt to find suitable ways for data hiding. As a case in point is the development of steganography, a technique used for hiding the important information imperceptibly. As far as the present work is concerned, the researcher adopts the steganography system for the purpose of embedding secret data within the frequency domain. Such a step can be done by modifying the DCT coefficients in a content-based manner, so that the embedding map will be able to easily identify the embedding blocks; a matter which in turn helps recover the data hidden in the frequency domain. The arrived at results reflected the manageability of the system to fight against AWGN and JPEG compression attacks and a high quality stego-images. However, being only part of an image is used for the purpose of hiding data has limited the capacity of the system in this regards.
AB - The sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have exerted much of their time and efforts in an attempt to find suitable ways for data hiding. As a case in point is the development of steganography, a technique used for hiding the important information imperceptibly. As far as the present work is concerned, the researcher adopts the steganography system for the purpose of embedding secret data within the frequency domain. Such a step can be done by modifying the DCT coefficients in a content-based manner, so that the embedding map will be able to easily identify the embedding blocks; a matter which in turn helps recover the data hidden in the frequency domain. The arrived at results reflected the manageability of the system to fight against AWGN and JPEG compression attacks and a high quality stego-images. However, being only part of an image is used for the purpose of hiding data has limited the capacity of the system in this regards.
UR - http://www.scopus.com/inward/record.url?scp=84891681669&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84891681669&partnerID=8YFLogxK
U2 - 10.1016/j.proeng.2013.02.060
DO - 10.1016/j.proeng.2013.02.060
M3 - Conference contribution
AN - SCOPUS:84891681669
SN - 9781627486347
T3 - Procedia Engineering
SP - 463
EP - 471
BT - Malaysian Technical Universities Conference on Engineering and Technology 2012, MUCET 2012
PB - Elsevier Ltd
T2 - 2012 Malaysian Technical Universities Conference on Engineering and Technology, MUCET 2012
Y2 - 20 November 2012 through 21 November 2012
ER -