A new model for hiding text in an image using logical connective
| Format: | Restricted Document |
|---|
| _version_ | 1860797313108148224 |
|---|---|
| building | INTELEK Repository |
| collection | Online Access |
| collectionurl | https://intelek.unisza.edu.my/intelek/pages/search.php?search=!collection407072 |
| date | 2015-07-27 11:02:25 |
| format | Restricted Document |
| id | 12201 |
| institution | UniSZA |
| internalnotes | [1] V. Sharma and S. Kumar, “A New Approach to Hide Text in Images Using Steganography,” International Journal of Advanced Research in Computer Science and Software Engineering. vol. 3 no. 4, (2013). [2] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, “Digital Image Steganography: Survey and Analysis of Current Methods,” Signal Processing, vol. 90 no. 3, (2010). [3] V. L. Reddy, A. Subramanyam and P.C Reddy, “Implementation of LSB Steganography and Its Evaluation for Various File Formats,” Int. J. Advanced Networking and Applications, vol. 2 no. 5, (2011). [4] G. Abboud, J. Marean and R.V. Yampolskiy, “Editors. Steganography and Visual Cryptography,” Proceedings of Computer Forensics in Systematic Approaches to Digital Forensic Engineering (SADFE), CA, May 20 (2010). [5] M. Y. Wu, Y. K. Ho and J. H. Lee, “An Iterative Method of Palette-Based Image Steganography,” Pattern Recognition Letters. vol. 25 no. 3 (2004). [6] M. S. Subhedar and V. H. Mankar, “Current Status and Key Issues in Image Steganography,” A Survey. Computer Science Review, vol. 3, (2014). [7] M. M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin and M. Z. I. Shamsuddin, “Editors. Information Hiding Using Steganography,” Proceedings of Telecommunication Technology Proceedings, January 14-15 (2003). [8] C. Maiti, D. Baksi, I. Zamider, P. Gorai and D. R. Kisku, “Data Hiding in Images Using Some Efficient Steganography Techniques,” Signal Processing, Image Processing and Pattern Recognition, (2011). [9] N. F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen Computer,” vol. 31 no. 2 (1998). [10] M. S. Rana, B. S. Sangwan and J. Jangir, “Art of Hiding: An Introduction to Steganography,” International Journal of Engineering and Computer Science, vol. 1 no. 1, (2014). [11] S. Singh and G. Agarwal, “Use of Image to Secure Text Message with the Help of LSB Replacement,” International Journal of Applied Engineering Research. 1 (2010). [12] A. H. Lashkari, A. A. Manaf, M. Masrom and S. M. Daud, “A Survey On Image Steganography Algorithms and Evaluation,” Digital Information Processing and Communications, (2011). [13] M. Tang, J. Hu and W. Song, “A High Capacity Image Steganography Using Multi-Layer Embedding,” Optik-International Journal for Light and Electron Optics, vol. 125 no. 15, (2014). [14] S. Sarreshtedari and M. A. Akhaee, “One-Third Probability Embedding: A New ±1 Histogram Compensating Image Least Significant Bit Steganography Scheme,” IET Image Processing, vol. 8 no. 2, (2013). [15] K. A. Darabkh, I. F. Jafar, R. Al-Zubi and M. Hawa, “Editors. An Improved Image Least Significant Bit Replacement Method,” Proceedings of International Convention on Information and Communication Technology, Opatija, May 26-30 (2014). [16] H. D. Yuan, “Secret sharing with multi-cover adaptive steganography,” Information Sciences, vol. 254, (2014). [17] N. Akhtar, S. Khan and P. Johri, “Editors. Enhancing the Security and Quality of LSB Based Image Steganography,” Proceedings of International Conference on Computational Intelligence and Communication Networks, Mathura, September 27-29 (2013). [18] N. Akhtar, S. Khan and P. Johri, “Editors. An Improved Inverted LSB Image Steganography,” Proceedings of International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), Ghaziabad, February 7-8 (2014). [19] K. H. Rosen, “Editor, Discrete Mathematics and its Applications,” New York: Mc Graw Hill, (2007). |
| originalfilename | 6501-01-FH02-FIK-15-03537.jpg |
| person | UniSZA Unisza unisza |
| recordtype | oai_dc |
| resourceurl | https://intelek.unisza.edu.my/intelek/pages/view.php?ref=12201 |
| spelling | 12201 https://intelek.unisza.edu.my/intelek/pages/view.php?ref=12201 https://intelek.unisza.edu.my/intelek/pages/search.php?search=!collection407072 Restricted Document Article Journal UniSZA Unisza unisza image/jpeg inches 96 96 762 24 24 1430 2015-07-27 11:02:25 1430x762 6501-01-FH02-FIK-15-03537.jpg UniSZA Private Access A new model for hiding text in an image using logical connective International Journal of Multimedia and Ubiquitous Engineering The objective of this study is to propose a new model for hiding text in an image. The proposed model use logical connective in propositional logic to calculate a new binary number of secret message. This model can produce a low computational complexity of steganography because of the simplicity of the proposed algorithm. Moreover, the using of simple operator but very efficient is expected to be able to hide high capacity of a secret message. 10 6 Science and Engineering Research Support Society Science and Engineering Research Support Society 195-202 [1] V. Sharma and S. Kumar, “A New Approach to Hide Text in Images Using Steganography,” International Journal of Advanced Research in Computer Science and Software Engineering. vol. 3 no. 4, (2013). [2] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, “Digital Image Steganography: Survey and Analysis of Current Methods,” Signal Processing, vol. 90 no. 3, (2010). [3] V. L. Reddy, A. Subramanyam and P.C Reddy, “Implementation of LSB Steganography and Its Evaluation for Various File Formats,” Int. J. Advanced Networking and Applications, vol. 2 no. 5, (2011). [4] G. Abboud, J. Marean and R.V. Yampolskiy, “Editors. Steganography and Visual Cryptography,” Proceedings of Computer Forensics in Systematic Approaches to Digital Forensic Engineering (SADFE), CA, May 20 (2010). [5] M. Y. Wu, Y. K. Ho and J. H. Lee, “An Iterative Method of Palette-Based Image Steganography,” Pattern Recognition Letters. vol. 25 no. 3 (2004). [6] M. S. Subhedar and V. H. Mankar, “Current Status and Key Issues in Image Steganography,” A Survey. Computer Science Review, vol. 3, (2014). [7] M. M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin and M. Z. I. Shamsuddin, “Editors. Information Hiding Using Steganography,” Proceedings of Telecommunication Technology Proceedings, January 14-15 (2003). [8] C. Maiti, D. Baksi, I. Zamider, P. Gorai and D. R. Kisku, “Data Hiding in Images Using Some Efficient Steganography Techniques,” Signal Processing, Image Processing and Pattern Recognition, (2011). [9] N. F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen Computer,” vol. 31 no. 2 (1998). [10] M. S. Rana, B. S. Sangwan and J. Jangir, “Art of Hiding: An Introduction to Steganography,” International Journal of Engineering and Computer Science, vol. 1 no. 1, (2014). [11] S. Singh and G. Agarwal, “Use of Image to Secure Text Message with the Help of LSB Replacement,” International Journal of Applied Engineering Research. 1 (2010). [12] A. H. Lashkari, A. A. Manaf, M. Masrom and S. M. Daud, “A Survey On Image Steganography Algorithms and Evaluation,” Digital Information Processing and Communications, (2011). [13] M. Tang, J. Hu and W. Song, “A High Capacity Image Steganography Using Multi-Layer Embedding,” Optik-International Journal for Light and Electron Optics, vol. 125 no. 15, (2014). [14] S. Sarreshtedari and M. A. Akhaee, “One-Third Probability Embedding: A New ±1 Histogram Compensating Image Least Significant Bit Steganography Scheme,” IET Image Processing, vol. 8 no. 2, (2013). [15] K. A. Darabkh, I. F. Jafar, R. Al-Zubi and M. Hawa, “Editors. An Improved Image Least Significant Bit Replacement Method,” Proceedings of International Convention on Information and Communication Technology, Opatija, May 26-30 (2014). [16] H. D. Yuan, “Secret sharing with multi-cover adaptive steganography,” Information Sciences, vol. 254, (2014). [17] N. Akhtar, S. Khan and P. Johri, “Editors. Enhancing the Security and Quality of LSB Based Image Steganography,” Proceedings of International Conference on Computational Intelligence and Communication Networks, Mathura, September 27-29 (2013). [18] N. Akhtar, S. Khan and P. Johri, “Editors. An Improved Inverted LSB Image Steganography,” Proceedings of International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), Ghaziabad, February 7-8 (2014). [19] K. H. Rosen, “Editor, Discrete Mathematics and its Applications,” New York: Mc Graw Hill, (2007). |
| spellingShingle | A new model for hiding text in an image using logical connective |
| summary | The objective of this study is to propose a new model for hiding text in an image. The proposed model use logical connective in propositional logic to calculate a new binary number of secret message. This model can produce a low computational complexity of steganography because of the simplicity of the proposed algorithm. Moreover, the using of simple operator but very efficient is expected to be able to hide high capacity of a secret message. |
| title | A new model for hiding text in an image using logical connective |
| title_full | A new model for hiding text in an image using logical connective |
| title_fullStr | A new model for hiding text in an image using logical connective |
| title_full_unstemmed | A new model for hiding text in an image using logical connective |
| title_short | A new model for hiding text in an image using logical connective |
| title_sort | new model for hiding text in an image using logical connective |