Abstract

The problem of protecting information, modification, privacy and origin validation are very important issues and became the concern of many researchers. Handling these problems definitely is a big challenge and this is probably why so much attention directed to the development of information protection schemes. In this paper, we propose a robust model that combines and integrates steganographic techniques with encryption, and error detection and correction techniques in order achieve secrecy, authentication and integrity. The idea of applying these techniques is based on decomposing the image into three separate color planes Red, Green and Blue and then depending on the encryption key we divide the image into N blocks. By applying DWT on each block independently, this model enables hiding the information in the image in an unpredictable manner. The part of the image where information embedded is a key depended and unknown to the intruder and by this we achieve blinded DWT effect. To enhance reliability the proposed model that uses hamming code which helps to recover lost or modified information. The proposed Model implemented and tested successfully.

Highlights

  • Mark kahs in [1] has defined steganography as the art and main science of communicating such that the existence of communications is unknown

  • The Discrete Cosine Transformation (DCT) and the Discrete Wavelet Transformation (DWT) are the two most common steganografic domain transformation methods used in the transform domain and they are the most complex and efficient techniques

  • It’s the simplest technique used in image steganography, in Least Significant Bit (LSB) technique the data that we want to hide inserted into the least significant bits of the pixel information [4]

Read more

Summary

INTRODUCTION

Mark kahs in [1] has defined steganography as the art and main science of communicating such that the existence of communications is unknown. The goal of steganography is hiding messages into another carrier, in a way that does not allow outsiders to detect or recognize that there is a hidden message Encryption is another technique that can be used to protect the information and provide secure communication, but in this case the outsiders know and can see the cipher text but they could not understand and use it [2]. The second type is the text stenography, and it means hiding the secret messages into other texts This paper addresses the main steganographic challenges in order to achieve a compromise between the capacity of the embedded data and the robustness to certain attacks, while keeping the perceptual quality of the stego-medium at an acceptable level. 1) Section II Literature review. 2) Section III discusses the proposed Model. 3) Section IV discusses the implementation results. 4) Section V conclution. 5) Secttion VI future work

LSB Technique
Secret Data Hiding
Description of the proposed Model
IMPLEMENTATION OF THE PROPOSED MODEL
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call