Abstract

The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and quickly through them. Because the online environment is general and open, the unauthorized one can control information were transmitted between any two parts and interception of getting access for it, because of that there is an emergency need for write covered, which is the science of hiding secret information in a digital cover such as an images, so it is impossible for the normal person and others unauthorized to detected or perceives. In this paper, the technology in the field of information hiding in the images is developed, where first, the cover (PNG, BMP) image is segmented using Chan-Vese algorithm, then the text will hide in the segmented image depending on the areas of clipping. The standards (PSNR, BER) are used to measure technical efficiency. In addition the algorithm of this technique is implemented in Matlab.

Highlights

  • As digital multimedia works become available for retransmission, reproduction, and publishing over the internet, a real need for protection against unauthorized copy and distribution is increased

  • The most promising solution for this challenging problem seems to lie in information hiding techniques

  • Information hiding is the process of embedding a message into digital media

Read more

Summary

Introduction

As digital multimedia works (video, audio and images) become available for retransmission, reproduction, and publishing over the internet, a real need for protection against unauthorized copy and distribution is increased. Information hiding is the process of embedding a message into digital media. Message is embedded into digital media, which can be distributed and use d normally. Segmentation is the process of partitioning an image into a set of distinct regions, which are different in some important qualitative or quantitative way This is a critical intermediate step in all high level object-recognition tasks. In this system the message m is embedded into the cover-object C (could be image, audio or video) to produce the stego-object S that should has the same fidelity of C. The simplest approach to hide data within an image file is called least significant bit (LSB) insertion. One potential problem with any of these methods is that they can be found by an adversary who is looking. [6]

Segmentation
The Level Set Segmentation Method
The Chan-Vese Segmentation Model
11. Summary
12. Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.