A new model for hiding text in an image using logical connective

Bibliographic Details
Format: Restricted Document
_version_ 1860797313108148224
building INTELEK Repository
collection Online Access
collectionurl https://intelek.unisza.edu.my/intelek/pages/search.php?search=!collection407072
date 2015-07-27 11:02:25
format Restricted Document
id 12201
institution UniSZA
internalnotes [1] V. Sharma and S. Kumar, “A New Approach to Hide Text in Images Using Steganography,” International Journal of Advanced Research in Computer Science and Software Engineering. vol. 3 no. 4, (2013). [2] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, “Digital Image Steganography: Survey and Analysis of Current Methods,” Signal Processing, vol. 90 no. 3, (2010). [3] V. L. Reddy, A. Subramanyam and P.C Reddy, “Implementation of LSB Steganography and Its Evaluation for Various File Formats,” Int. J. Advanced Networking and Applications, vol. 2 no. 5, (2011). [4] G. Abboud, J. Marean and R.V. Yampolskiy, “Editors. Steganography and Visual Cryptography,” Proceedings of Computer Forensics in Systematic Approaches to Digital Forensic Engineering (SADFE), CA, May 20 (2010). [5] M. Y. Wu, Y. K. Ho and J. H. Lee, “An Iterative Method of Palette-Based Image Steganography,” Pattern Recognition Letters. vol. 25 no. 3 (2004). [6] M. S. Subhedar and V. H. Mankar, “Current Status and Key Issues in Image Steganography,” A Survey. Computer Science Review, vol. 3, (2014). [7] M. M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin and M. Z. I. Shamsuddin, “Editors. Information Hiding Using Steganography,” Proceedings of Telecommunication Technology Proceedings, January 14-15 (2003). [8] C. Maiti, D. Baksi, I. Zamider, P. Gorai and D. R. Kisku, “Data Hiding in Images Using Some Efficient Steganography Techniques,” Signal Processing, Image Processing and Pattern Recognition, (2011). [9] N. F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen Computer,” vol. 31 no. 2 (1998). [10] M. S. Rana, B. S. Sangwan and J. Jangir, “Art of Hiding: An Introduction to Steganography,” International Journal of Engineering and Computer Science, vol. 1 no. 1, (2014). [11] S. Singh and G. Agarwal, “Use of Image to Secure Text Message with the Help of LSB Replacement,” International Journal of Applied Engineering Research. 1 (2010). [12] A. H. Lashkari, A. A. Manaf, M. Masrom and S. M. Daud, “A Survey On Image Steganography Algorithms and Evaluation,” Digital Information Processing and Communications, (2011). [13] M. Tang, J. Hu and W. Song, “A High Capacity Image Steganography Using Multi-Layer Embedding,” Optik-International Journal for Light and Electron Optics, vol. 125 no. 15, (2014). [14] S. Sarreshtedari and M. A. Akhaee, “One-Third Probability Embedding: A New ±1 Histogram Compensating Image Least Significant Bit Steganography Scheme,” IET Image Processing, vol. 8 no. 2, (2013). [15] K. A. Darabkh, I. F. Jafar, R. Al-Zubi and M. Hawa, “Editors. An Improved Image Least Significant Bit Replacement Method,” Proceedings of International Convention on Information and Communication Technology, Opatija, May 26-30 (2014). [16] H. D. Yuan, “Secret sharing with multi-cover adaptive steganography,” Information Sciences, vol. 254, (2014). [17] N. Akhtar, S. Khan and P. Johri, “Editors. Enhancing the Security and Quality of LSB Based Image Steganography,” Proceedings of International Conference on Computational Intelligence and Communication Networks, Mathura, September 27-29 (2013). [18] N. Akhtar, S. Khan and P. Johri, “Editors. An Improved Inverted LSB Image Steganography,” Proceedings of International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), Ghaziabad, February 7-8 (2014). [19] K. H. Rosen, “Editor, Discrete Mathematics and its Applications,” New York: Mc Graw Hill, (2007).
originalfilename 6501-01-FH02-FIK-15-03537.jpg
person UniSZA
Unisza
unisza
recordtype oai_dc
resourceurl https://intelek.unisza.edu.my/intelek/pages/view.php?ref=12201
spelling 12201 https://intelek.unisza.edu.my/intelek/pages/view.php?ref=12201 https://intelek.unisza.edu.my/intelek/pages/search.php?search=!collection407072 Restricted Document Article Journal UniSZA Unisza unisza image/jpeg inches 96 96 762 24 24 1430 2015-07-27 11:02:25 1430x762 6501-01-FH02-FIK-15-03537.jpg UniSZA Private Access A new model for hiding text in an image using logical connective International Journal of Multimedia and Ubiquitous Engineering The objective of this study is to propose a new model for hiding text in an image. The proposed model use logical connective in propositional logic to calculate a new binary number of secret message. This model can produce a low computational complexity of steganography because of the simplicity of the proposed algorithm. Moreover, the using of simple operator but very efficient is expected to be able to hide high capacity of a secret message. 10 6 Science and Engineering Research Support Society Science and Engineering Research Support Society 195-202 [1] V. Sharma and S. Kumar, “A New Approach to Hide Text in Images Using Steganography,” International Journal of Advanced Research in Computer Science and Software Engineering. vol. 3 no. 4, (2013). [2] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, “Digital Image Steganography: Survey and Analysis of Current Methods,” Signal Processing, vol. 90 no. 3, (2010). [3] V. L. Reddy, A. Subramanyam and P.C Reddy, “Implementation of LSB Steganography and Its Evaluation for Various File Formats,” Int. J. Advanced Networking and Applications, vol. 2 no. 5, (2011). [4] G. Abboud, J. Marean and R.V. Yampolskiy, “Editors. Steganography and Visual Cryptography,” Proceedings of Computer Forensics in Systematic Approaches to Digital Forensic Engineering (SADFE), CA, May 20 (2010). [5] M. Y. Wu, Y. K. Ho and J. H. Lee, “An Iterative Method of Palette-Based Image Steganography,” Pattern Recognition Letters. vol. 25 no. 3 (2004). [6] M. S. Subhedar and V. H. Mankar, “Current Status and Key Issues in Image Steganography,” A Survey. Computer Science Review, vol. 3, (2014). [7] M. M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin and M. Z. I. Shamsuddin, “Editors. Information Hiding Using Steganography,” Proceedings of Telecommunication Technology Proceedings, January 14-15 (2003). [8] C. Maiti, D. Baksi, I. Zamider, P. Gorai and D. R. Kisku, “Data Hiding in Images Using Some Efficient Steganography Techniques,” Signal Processing, Image Processing and Pattern Recognition, (2011). [9] N. F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen Computer,” vol. 31 no. 2 (1998). [10] M. S. Rana, B. S. Sangwan and J. Jangir, “Art of Hiding: An Introduction to Steganography,” International Journal of Engineering and Computer Science, vol. 1 no. 1, (2014). [11] S. Singh and G. Agarwal, “Use of Image to Secure Text Message with the Help of LSB Replacement,” International Journal of Applied Engineering Research. 1 (2010). [12] A. H. Lashkari, A. A. Manaf, M. Masrom and S. M. Daud, “A Survey On Image Steganography Algorithms and Evaluation,” Digital Information Processing and Communications, (2011). [13] M. Tang, J. Hu and W. Song, “A High Capacity Image Steganography Using Multi-Layer Embedding,” Optik-International Journal for Light and Electron Optics, vol. 125 no. 15, (2014). [14] S. Sarreshtedari and M. A. Akhaee, “One-Third Probability Embedding: A New ±1 Histogram Compensating Image Least Significant Bit Steganography Scheme,” IET Image Processing, vol. 8 no. 2, (2013). [15] K. A. Darabkh, I. F. Jafar, R. Al-Zubi and M. Hawa, “Editors. An Improved Image Least Significant Bit Replacement Method,” Proceedings of International Convention on Information and Communication Technology, Opatija, May 26-30 (2014). [16] H. D. Yuan, “Secret sharing with multi-cover adaptive steganography,” Information Sciences, vol. 254, (2014). [17] N. Akhtar, S. Khan and P. Johri, “Editors. Enhancing the Security and Quality of LSB Based Image Steganography,” Proceedings of International Conference on Computational Intelligence and Communication Networks, Mathura, September 27-29 (2013). [18] N. Akhtar, S. Khan and P. Johri, “Editors. An Improved Inverted LSB Image Steganography,” Proceedings of International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), Ghaziabad, February 7-8 (2014). [19] K. H. Rosen, “Editor, Discrete Mathematics and its Applications,” New York: Mc Graw Hill, (2007).
spellingShingle A new model for hiding text in an image using logical connective
summary The objective of this study is to propose a new model for hiding text in an image. The proposed model use logical connective in propositional logic to calculate a new binary number of secret message. This model can produce a low computational complexity of steganography because of the simplicity of the proposed algorithm. Moreover, the using of simple operator but very efficient is expected to be able to hide high capacity of a secret message.
title A new model for hiding text in an image using logical connective
title_full A new model for hiding text in an image using logical connective
title_fullStr A new model for hiding text in an image using logical connective
title_full_unstemmed A new model for hiding text in an image using logical connective
title_short A new model for hiding text in an image using logical connective
title_sort new model for hiding text in an image using logical connective