Abstract

Hiding information is an effective solution for the protection of copyright and confidentiality to allow a person to send the data in the middle of the cover image to a person without knowing any third party in this transmission, methods of delivering secret messages are very important. This research provides a way to hide data (which is a text file) after is encrypted adoption method (Keyword Mixed Transposition) to produce cipher text is included in Low–High coefficient wavelet transform and get a good quality image and the possibility of recovering fully embedded message and decoded without relying on the original image. Results have applied to the digital images to get inline images to the data with a high correlation coefficient when compared with the original images in addition to that they gave a few differences when calculating measurements(SNR, PSNR, MSE).

Highlights

  • Hiding information is an effective solution for the protection of copyright and confidentiality to allow a person to send the data in the middle

  • produce cipher text is included in Low

  • Results have applied to the digital images to get inline images to the data

Read more

Summary

Introduction

Hiding information is an effective solution for the protection of copyright and confidentiality to allow a person to send the data in the middle of the cover image to a person without knowing any third party in this transmission, methods of delivering secret messages are very important. ‫إن أخفاء المعلومات هو حل فعال لحماية حقوق الطبع والسرية بحيث تسمح للشخص بإرسال البيانات في‬ ‫ إن طرق تسطليم الرسطا ل‬،‫) إلطش صطخص طرون معرفطة أل طرا االطث إططا الإرسطال‬Cover Image ‫وسطغ اططاء‬ ‫) بعطر إن تطتم‬txt File ‫ هطا البحث يقرم ريقة لإخفاء البيانات والتي هي عبارة عط ملطن ن طي‬.ً‫السرية مإمة جرا‬ ‫) لإنتطاص نططص مشطفر تطتم ت طمين فططي‬Keyword Mixed Transposition ‫تشطفير الطنص باعتمطاد ريقطة‬ ‫) والح طول علطش صطورة‬Low–High Coefficient ‫معاملات التحويل المويجي ذات الترددات الوا ئة – العاليطة‬ ‫ذات نوعية جيرة وإمكانية استرجاع الرسالة الم منة بشكل كامل وفك صفرتإا وبرون الاعتماد علش ال ورة الأصلية‬ ‫ أدت النتطا ا المطبقطة علطش ال طور الرميطة إلطش الح طول علطش صطور م طمنة للبيانطات‬.)Blind Technique

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call