Reversible data hiding scheme based on 3-Least significant bits and mix column transform
Steganography is the science of hiding a message signal in a host signal, without any perceptual distortion of the host signal. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganogr...
| Main Authors: | , , |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English English English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/32252/ http://irep.iium.edu.my/32252/1/1_atis_wafaa13-revised.pdf http://irep.iium.edu.my/32252/2/2_Acceptance_Gmail_-_ATIS_2013_submission_3.pdf http://irep.iium.edu.my/32252/3/3_programme.pdf http://irep.iium.edu.my/32252/4/4_Pres_ATIS_Wafaa-checked2.pdf |
| _version_ | 1848780527951151104 |
|---|---|
| author | Abduallah, Wafaa Mustafa Rahma, Abdul Monem S. Pathan, Al-Sakib Khan |
| author_facet | Abduallah, Wafaa Mustafa Rahma, Abdul Monem S. Pathan, Al-Sakib Khan |
| author_sort | Abduallah, Wafaa Mustafa |
| building | IIUM Repository |
| collection | Online Access |
| description | Steganography is the science of hiding a message signal in a host signal, without any perceptual distortion of the host signal. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researchers how to improve the capacity of hidden data into host image without causing any statistically significant modification. In this work, we propose a reversible steganography scheme which can hide large amount of information without affecting the imperceptibility aspect of the stego-image and at the same time, it increases the security level of the system through using different method for embedding based on distinct type of transform, called Mix Column Transform. Our experimental results prove the ability of our proposed scheme in balancing among the three critical properties: capacity, security, and imperceptibility. |
| first_indexed | 2025-11-14T15:35:06Z |
| format | Proceeding Paper |
| id | iium-32252 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English English English English |
| last_indexed | 2025-11-14T15:35:06Z |
| publishDate | 2013 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-322522013-10-08T04:50:37Z http://irep.iium.edu.my/32252/ Reversible data hiding scheme based on 3-Least significant bits and mix column transform Abduallah, Wafaa Mustafa Rahma, Abdul Monem S. Pathan, Al-Sakib Khan QA75 Electronic computers. Computer science Steganography is the science of hiding a message signal in a host signal, without any perceptual distortion of the host signal. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researchers how to improve the capacity of hidden data into host image without causing any statistically significant modification. In this work, we propose a reversible steganography scheme which can hide large amount of information without affecting the imperceptibility aspect of the stego-image and at the same time, it increases the security level of the system through using different method for embedding based on distinct type of transform, called Mix Column Transform. Our experimental results prove the ability of our proposed scheme in balancing among the three critical properties: capacity, security, and imperceptibility. 2013 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/32252/1/1_atis_wafaa13-revised.pdf application/pdf en http://irep.iium.edu.my/32252/2/2_Acceptance_Gmail_-_ATIS_2013_submission_3.pdf application/pdf en http://irep.iium.edu.my/32252/3/3_programme.pdf application/pdf en http://irep.iium.edu.my/32252/4/4_Pres_ATIS_Wafaa-checked2.pdf Abduallah, Wafaa Mustafa and Rahma, Abdul Monem S. and Pathan, Al-Sakib Khan (2013) Reversible data hiding scheme based on 3-Least significant bits and mix column transform. In: 4th International Workshop on Applications and Techniques in Information Security (ATIS), 26 September 2013, Sydney, Australia. (Unpublished) http://www.deakin.edu.au/sebe/it/cyberspace-security/ |
| spellingShingle | QA75 Electronic computers. Computer science Abduallah, Wafaa Mustafa Rahma, Abdul Monem S. Pathan, Al-Sakib Khan Reversible data hiding scheme based on 3-Least significant bits and mix column transform |
| title | Reversible data hiding scheme based on 3-Least significant bits and mix column transform |
| title_full | Reversible data hiding scheme based on 3-Least significant bits and mix column transform |
| title_fullStr | Reversible data hiding scheme based on 3-Least significant bits and mix column transform |
| title_full_unstemmed | Reversible data hiding scheme based on 3-Least significant bits and mix column transform |
| title_short | Reversible data hiding scheme based on 3-Least significant bits and mix column transform |
| title_sort | reversible data hiding scheme based on 3-least significant bits and mix column transform |
| topic | QA75 Electronic computers. Computer science |
| url | http://irep.iium.edu.my/32252/ http://irep.iium.edu.my/32252/ http://irep.iium.edu.my/32252/1/1_atis_wafaa13-revised.pdf http://irep.iium.edu.my/32252/2/2_Acceptance_Gmail_-_ATIS_2013_submission_3.pdf http://irep.iium.edu.my/32252/3/3_programme.pdf http://irep.iium.edu.my/32252/4/4_Pres_ATIS_Wafaa-checked2.pdf |