An Efficiency and Algorithm Detection for Stenography in Digital Symbols

Full Text (PDF, 567KB), PP.34-38

Views: 0 Downloads: 0

Author(s)

Takialddin A. Al Smadi 1,* Mohammed Maitah 2

1. Department of Communications and Electronics Engineering, College of Engineering, Jerash University, Jerash-Jordan

2. Computer Science Department, King Saud University, Riyadh, KSA

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2014.01.05

Received: 11 Jun. 2013 / Revised: 4 Sep. 2013 / Accepted: 18 Oct. 2013 / Published: 8 Nov. 2013

Index Terms

Embedded System, Steganography, Digital image, Information symbol

Abstract

In modern conditions; Steganography has become the digital strategy of hiding files in one form or other MEDIA like images, sound files or video files. Algorithms built-in digital information for color images based techniques steganography. This work presents a new method of steganography based on space domain to encode more information in the image, making small changes in their pixels. The results work obtained in this work that the new detection method of steganography based on new spatial coding additional information in the image, making small changes in their pixels based on the expansion of the range is designed for testing the proposed structure. This work study is to develop a new method to detect human faces, reflected in digital photography, with a high work rate and accuracy of detection.

Cite This Paper

Takialddin A. Al Smadi, Mohammed Maitah, "An Efficiency and Algorithm Detection for Stenography in Digital Symbols", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.1, pp.34-38, 2014. DOI:10.5815/ijcnis.2014.01.05

Reference

[1]Janakiraman T. N., and Chandra Mouli P. V. S. S. R., " Color Image Edge Detection using Pseudo-Complement and Matrix Operations", Proceedings of World Academy of Science, Engineering and Technology Volume 32, ISSN 2070-3740, 2008.
[2]Ingemar, J. Cox. Digita l waterma king and d ste gano graphy J. Ingemar Cox, L. Mi ller Matt er Matt hew, A. Bloom Jeffrey effrey [et al.]. – Mor gan Kaufmann Pu blis hers, 2008.
[3]Van de Weijer J.; Gevers Th. and Geusebroek J.M., " Color Edge Detection by Photometric Quasi-
[4]Invariants", Proceedings of the Ninth IEEE International Conference on Computer Vision (ICCV 2003) 2-Volume Set, 2003.
[5]F. Bartolini, M. Barni, and A. Piva, “Performance analysis of ST-DM,watermarking in presence of nonadditive attacks”, IEEE Transactions onSignal Processing, Vol. 52, No. 10, October 2004, pp. 2965–2974.
[6]B. Chen and G. Wornell, “Quantization index modulation: a classof provably good methods for digital watermarking and information embedding”, IEEE Transactions on Information Theory, Vol. 47, No. 4,May 2001, pp. 1423–1443.
[7]M. Barni, F. Bartolini, A. De Rosa, and A. Piva, “Capacity of full frameDCT image watermarks”, IEEE Transactions on Image Processing, Vol.9, No. 8, August 2000, pp. 1450–1455.
[8]K. Su, D. Kundur, and D. Hatzinakos, “Statistical invisibility forcollusion-resistant digital video watermarking”, IEEE Transactions onMultimedia, Vol. 7,No. 1, Feburary 2005, pp. 43–51.
[9]Mei-Yi, W., Yu-Kun, H, Jia-Hong, L. (2004): An Iterative Method of Palette Based mage Steganography, Journal of Patern ecognition Letters, Vol(25).
[10]Xiang-yang, L. , Dao-shun,W., Ping, W., Fen-lin, L.( (2008): A review on Blind
[11]Detection for Image Steganography, Journal of Signal Processing, Vol (88), Issue (9).
[12]Pei-Chun Chen, Yung-Sheng Chen,A communication system model for digital image watermarking problems, IAENG Computer Science, 34:2, IJCS_34_2_01 http://www.iaeng.org/IJCS/issues_v34/issue_2/IJCS_34_2_01.pdf
[13]http://vis.uky.edu/~cheung/courses/ee639_fall04/readings/watermarkITsurvey.pdf
[14]http://www.springer.com/978-3-642-14312-0
[15]http://www.hindawi.com/journals/ijvt/2012/50625/