Secured and robust information hiding scheme

N. H. Abdul-Mahdi, A. Yahya, R. B. Ahmad, O. M. Al-Qershi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

The sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have exerted much of their time and efforts in an attempt to find suitable ways for data hiding. As a case in point is the development of steganography, a technique used for hiding the important information imperceptibly. As far as the present work is concerned, the researcher adopts the steganography system for the purpose of embedding secret data within the frequency domain. Such a step can be done by modifying the DCT coefficients in a content-based manner, so that the embedding map will be able to easily identify the embedding blocks; a matter which in turn helps recover the data hidden in the frequency domain. The arrived at results reflected the manageability of the system to fight against AWGN and JPEG compression attacks and a high quality stego-images. However, being only part of an image is used for the purpose of hiding data has limited the capacity of the system in this regards.

Original languageEnglish
Title of host publicationMalaysian Technical Universities Conference on Engineering and Technology 2012, MUCET 2012
PublisherElsevier Ltd
Pages463-471
Number of pages9
Volume53
ISBN (Print)9781627486347
DOIs
Publication statusPublished - Jan 1 2013
Event2012 Malaysian Technical Universities Conference on Engineering and Technology, MUCET 2012 - Kangar, Perlis, Malaysia
Duration: Nov 20 2012Nov 21 2012

Other

Other2012 Malaysian Technical Universities Conference on Engineering and Technology, MUCET 2012
CountryMalaysia
CityKangar, Perlis
Period11/20/1211/21/12

Fingerprint

Steganography
Image quality

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

Abdul-Mahdi, N. H., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2013). Secured and robust information hiding scheme. In Malaysian Technical Universities Conference on Engineering and Technology 2012, MUCET 2012 (Vol. 53, pp. 463-471). Elsevier Ltd. https://doi.org/10.1016/j.proeng.2013.02.060
Abdul-Mahdi, N. H. ; Yahya, A. ; Ahmad, R. B. ; Al-Qershi, O. M. / Secured and robust information hiding scheme. Malaysian Technical Universities Conference on Engineering and Technology 2012, MUCET 2012. Vol. 53 Elsevier Ltd, 2013. pp. 463-471
@inproceedings{47afa55bfae24828a6997ec7f8d0cc4a,
title = "Secured and robust information hiding scheme",
abstract = "The sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have exerted much of their time and efforts in an attempt to find suitable ways for data hiding. As a case in point is the development of steganography, a technique used for hiding the important information imperceptibly. As far as the present work is concerned, the researcher adopts the steganography system for the purpose of embedding secret data within the frequency domain. Such a step can be done by modifying the DCT coefficients in a content-based manner, so that the embedding map will be able to easily identify the embedding blocks; a matter which in turn helps recover the data hidden in the frequency domain. The arrived at results reflected the manageability of the system to fight against AWGN and JPEG compression attacks and a high quality stego-images. However, being only part of an image is used for the purpose of hiding data has limited the capacity of the system in this regards.",
author = "Abdul-Mahdi, {N. H.} and A. Yahya and Ahmad, {R. B.} and Al-Qershi, {O. M.}",
year = "2013",
month = "1",
day = "1",
doi = "10.1016/j.proeng.2013.02.060",
language = "English",
isbn = "9781627486347",
volume = "53",
pages = "463--471",
booktitle = "Malaysian Technical Universities Conference on Engineering and Technology 2012, MUCET 2012",
publisher = "Elsevier Ltd",
address = "United Kingdom",

}

Abdul-Mahdi, NH, Yahya, A, Ahmad, RB & Al-Qershi, OM 2013, Secured and robust information hiding scheme. in Malaysian Technical Universities Conference on Engineering and Technology 2012, MUCET 2012. vol. 53, Elsevier Ltd, pp. 463-471, 2012 Malaysian Technical Universities Conference on Engineering and Technology, MUCET 2012, Kangar, Perlis, Malaysia, 11/20/12. https://doi.org/10.1016/j.proeng.2013.02.060

Secured and robust information hiding scheme. / Abdul-Mahdi, N. H.; Yahya, A.; Ahmad, R. B.; Al-Qershi, O. M.

Malaysian Technical Universities Conference on Engineering and Technology 2012, MUCET 2012. Vol. 53 Elsevier Ltd, 2013. p. 463-471.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Secured and robust information hiding scheme

AU - Abdul-Mahdi, N. H.

AU - Yahya, A.

AU - Ahmad, R. B.

AU - Al-Qershi, O. M.

PY - 2013/1/1

Y1 - 2013/1/1

N2 - The sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have exerted much of their time and efforts in an attempt to find suitable ways for data hiding. As a case in point is the development of steganography, a technique used for hiding the important information imperceptibly. As far as the present work is concerned, the researcher adopts the steganography system for the purpose of embedding secret data within the frequency domain. Such a step can be done by modifying the DCT coefficients in a content-based manner, so that the embedding map will be able to easily identify the embedding blocks; a matter which in turn helps recover the data hidden in the frequency domain. The arrived at results reflected the manageability of the system to fight against AWGN and JPEG compression attacks and a high quality stego-images. However, being only part of an image is used for the purpose of hiding data has limited the capacity of the system in this regards.

AB - The sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have exerted much of their time and efforts in an attempt to find suitable ways for data hiding. As a case in point is the development of steganography, a technique used for hiding the important information imperceptibly. As far as the present work is concerned, the researcher adopts the steganography system for the purpose of embedding secret data within the frequency domain. Such a step can be done by modifying the DCT coefficients in a content-based manner, so that the embedding map will be able to easily identify the embedding blocks; a matter which in turn helps recover the data hidden in the frequency domain. The arrived at results reflected the manageability of the system to fight against AWGN and JPEG compression attacks and a high quality stego-images. However, being only part of an image is used for the purpose of hiding data has limited the capacity of the system in this regards.

UR - http://www.scopus.com/inward/record.url?scp=84891681669&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84891681669&partnerID=8YFLogxK

U2 - 10.1016/j.proeng.2013.02.060

DO - 10.1016/j.proeng.2013.02.060

M3 - Conference contribution

SN - 9781627486347

VL - 53

SP - 463

EP - 471

BT - Malaysian Technical Universities Conference on Engineering and Technology 2012, MUCET 2012

PB - Elsevier Ltd

ER -

Abdul-Mahdi NH, Yahya A, Ahmad RB, Al-Qershi OM. Secured and robust information hiding scheme. In Malaysian Technical Universities Conference on Engineering and Technology 2012, MUCET 2012. Vol. 53. Elsevier Ltd. 2013. p. 463-471 https://doi.org/10.1016/j.proeng.2013.02.060