Hiding text in gray image using mapping technique

被引:5
|
作者
Hussein, Hussein L. [1 ]
Abbass, Ahmed A. [2 ]
Naji, Sinan A. [3 ]
Al-augby, Salam [4 ]
Lafta, Jasim H. [5 ]
机构
[1] Baghdad Univ, Ibn Al Haitham Coll Educ, Baghdad, Iraq
[2] Kufa Univ, Coll Educ Girls, Najaf, Iraq
[3] Univ Informat Technol & Commun, Coll Engn, Baghdad, Iraq
[4] Kufa Univ, Fac Comp Sci & Maths, Najaf, Iraq
[5] Debrecen Univ, Fac Informat, Debrecen, Hungary
关键词
D O I
10.1088/1742-6596/1003/1/012032
中图分类号
O59 [应用物理学];
学科分类号
摘要
In order to hide the significant and secret message inside a cover object, Steganography is considered as one of the most used technique because of its strength. This paper presents a new steganography technique that it is difficult to discover or break by a third party. The ASCII Mapping Technique (AMT) is used to create an encoded table by mapping the text message and matching some bits with that of the cover image. The system saves the character parts matching and the location of which part of the pixels. Then change the related flag from zero to one the for matched locations so that they cannot be used again to strength the technique and make it more secure. The proposed technique was tested and showed low computational cost with effective performance to be used for multi-purpose applications.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Czech Text Steganography Method by Selective Hiding Technique
    Khan, Sungkrityayan
    Sankineni, Rishi
    Balagurunathan, Padmavathi
    Shree, Nujerlla Suresh Divya
    Balasubramanian, Abinaya
    [J]. WORLD CONGRESS ON ENGINEERING, WCE 2015, VOL I, 2015, : 482 - 485
  • [32] Algorithm for Text Hiding in Digital Image for Information Security
    Ibrahim, Ahmed
    Zabian, Arwa
    Esteteya, Farehan Nizar
    Al Padawy, Amani Khalid
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (06): : 262 - 268
  • [33] ADAPTIVE COLOR-TO-GRAY IMAGE MAPPING USING DIRECTIONAL TRANSFORM
    Miyashita, Yuko
    Tanaka, Yuichi
    Hasegawa, Madoka
    Kato, Shigeo
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2012), 2012, : 809 - 812
  • [34] A novel hybrid image hiding technique using elliptic curve cryptography and DNA computing technique
    Bharadwaja, A. Vyasa
    Ganesan, V.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (04) : 460 - 473
  • [35] A technique for image data hiding and reconstruction without host image
    Chae, JJ
    Manjunath, BS
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 : 386 - 396
  • [36] Scramble and Transform: An Image Data Hiding Technique
    Rezaei, Mohammad
    Moghaddam, Saeed Montazeri
    [J]. 2019 27TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2019), 2019, : 1874 - 1878
  • [37] Data Hiding in a Digital Cover Image using Chaotic Maps and LSB Technique
    Elkamchouchi, Hassan
    Salama, Wessam M.
    Abouelseoud, Yasmine
    [J]. 2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 198 - 203
  • [38] Performance analysis of data hiding in thermal image using alpha blending technique
    Rathika, S.
    Gayathri, R.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2021, 46 : 10164 - 10168
  • [39] Novel colour image-hiding scheme using error diffusion technique
    Chuang, J-C
    Chang, C-C
    Hu, Y-C
    [J]. IMAGING SCIENCE JOURNAL, 2008, 56 (01): : 11 - 22
  • [40] Text to Image Encryption Technique using RGB Substitution and AES
    Joshy, Amal
    Baby, Amitha K. X.
    Padma, S.
    Fasila, K. A.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 1133 - 1136