A Secure Data Hiding System

نویسنده

  • Fahd Alharbi
چکیده

Data hiding is the process of embedding data into a media form such as image, voice, and video. The Lest Significant Bit (LSB) is consider as the most widely used embedding technique. LSB embeds the secret message's bits into the least significant bit plane of the image in a sequentially manner . The LSB is simple, but it poses some critical issues. The secret message is easily detected and attacked duo to the sequential embedding process. Moreover, embedding using a higher bit plane would degrade the image quality severely. To increase the security of the data hiding system, we are using a bit plane decomposition based on Fibonacci numbers to allow for using higher bit plane without degrading the image quality. Also, the image's pixels used for embedding data are selected by using a Pseudo Random Number Generator(PRNG). Keywords— Data hiding, Image, LSB, Fibonacci, PRNG.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

A Novel Data Embedding Technique for Hiding Text in Video File using Steganography

Today’s internet applications require data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the solution for this problem is Steganography. That has to do with secure data transmission between a sender and a receiver; implementing Steganography is the best way. Steganography...

متن کامل

Survey on Image Encryption, Data Hiding and Secret Fragment Visible Mosaic Image Creation Techniques

So many skillful techniques are present for protection of confidential images from unauthorized access. Visual cryptography and data hiding are mainly used methods for secure transmission. But main problem of this method is that, during recovering stage exact image that send will not be retrieved. Small amount of distortion may occur. Some areas like medicine, military fields; small distortion ...

متن کامل

Shape based data Hiding Steganography as well as Steganalysis for Secure Communication System

With the increase in rate of unauthorized access and attacks security of confidential data is important. In this paper shape based data hiding algorithm is proposed for steganography as well as Steganalysis is done. In this algorithm, shape is taken to hide the data in an image. The secret information can be hidden only in the pixels which are available in the shape, instead of hiding secret in...

متن کامل

A New Biometric Template Protection Based on Secure Data Hiding Approach

Biometrics is a technology that has been widely used in many official and commercial identification applications. The extracted features from the biometric sample is called biometric template which is used during a biometric authentication process. The security of templates is the critical part of biometric system and one of the most crucial issues in designing a secure system. The proposed app...

متن کامل

Multilevel reversible data hiding based on histogram modification of difference images

Steganalysis detects the possible existence of secret messages embedding in a suspicious media. In general, secret data hiding techniques take the advantage of the weakness of human senses to embed secret messages into a common media and transmit them to the receivers. Because the change of the cover media is insensible to human visual systems, the cover channel is hidden. Therefore, data hidin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013