Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach
In this paper, we present a novel method for data hiding within transform domain of the color images. Our method is based on dividing an image into blocks, then applying the proposed transform on specified blocks and hiding the secret message within those. We show that the security can be increased...
| Main Authors: | Abduallah, Wafaa Mustafa, Rahma, Abdul Monem S., Pathan, Al-Sakib Khan |
|---|---|
| Format: | Article |
| Language: | English English English |
| Published: |
Elsevier, USA
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/36191/ http://irep.iium.edu.my/36191/4/36191.pdf http://irep.iium.edu.my/36191/7/36191_Mix%20column%20transform%20based%20on%20irreducible%20polynomial_SCOPUS.pdf http://irep.iium.edu.my/36191/8/36191_Mix%20column%20transform%20based%20on%20irreducible%20polynomial_WoS.pdf |
Similar Items
A new data hiding technique based on irreducible polynomials
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Reversible data hiding scheme based on 3-Least significant bits and mix column transform
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Data hiding within color images based on MCT with x-or operations
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
by: Agarwal, Praveen, et al.
Published: (2018)
by: Agarwal, Praveen, et al.
Published: (2018)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
Tackling Intruders in Wireless Mesh Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
A pay-and-stay model for tackling intruders in hybrid wireless mesh networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
A secured data hiding using affine transformation in video steganography
by: Ramalingam, Mritha, et al.
Published: (2020)
by: Ramalingam, Mritha, et al.
Published: (2020)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
Prototype development of VOIP steganography
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
Irreducible Representations of Groups of Order 8
by: Sarmin, Nor Haniza, et al.
Published: (2006)
by: Sarmin, Nor Haniza, et al.
Published: (2006)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
Outlawing irreducible life sentences: Europe on the brink?
by: Van Zyl Smit, Dirk
Published: (2010)
by: Van Zyl Smit, Dirk
Published: (2010)
Computing irreducible representations of two-generator groups
by: Sarmin, Nor Haniza, et al.
Published: (2009)
by: Sarmin, Nor Haniza, et al.
Published: (2009)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010)
by: Zamani, Mazdak
Published: (2010)
Steganography based on utilizing more surrounding pixels
by: Afrakhteh, Masoud
Published: (2010)
by: Afrakhteh, Masoud
Published: (2010)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Ruptured ectopic pregnancy presenting as an irreducible inguinal hernia
by: Prasannan, Subhita, et al.
Published: (2004)
by: Prasannan, Subhita, et al.
Published: (2004)
An Improved Image Steganography Scheme Based on RDWT and QR Decomposition
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018)
by: Ng, Ke-Huey, et al.
Published: (2018)
An artificial-intelligence-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Secret channel using video steganography
by: Lee, Kar Yee, et al.
Published: (2017)
by: Lee, Kar Yee, et al.
Published: (2017)
Equiconvergence in summation associated with elliptic polynomial
by: Fargana, A, et al.
Published: (2018)
by: Fargana, A, et al.
Published: (2018)
An always convergent algorithm for the largest eigenvalue of an irreducible nonnegative tensor
by: Liu, Y., et al.
Published: (2010)
by: Liu, Y., et al.
Published: (2010)
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
Recent advances in simulation and mathematical modeling of wireless networks
by: Misra, Sudip, et al.
Published: (2011)
by: Misra, Sudip, et al.
Published: (2011)
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018)
by: Taufik, Ichsan, et al.
Published: (2018)
Similar Items
-
A new data hiding technique based on irreducible polynomials
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013) -
Reversible data hiding scheme based on 3-Least significant bits and mix column transform
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013) -
Data hiding within color images based on MCT with x-or operations
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013) -
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
by: Agarwal, Praveen, et al.
Published: (2018) -
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)