research centers


Search results: Found 2

Listing 1 - 2 of 2
Sort by

Article
Information Hiding Based on Discrete Time Wavelet Transform and Huffman Coding

Author: Ammar Abdul-Amer Rashed
Journal: Engineering and Technology Journal مجلة الهندسة والتكنولوجيا ISSN: 16816900 24120758 Year: 2011 Volume: 29 Issue: 2 Pages: 295-304
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

The approach of This paper presentation a companied technique for hidingsecret messages (text) based on wavelet transform applying in cover image (a graylevel image 8bit) then Huffman encoding is also executed on the secretmessages,to increase the robustness of hiding system by inserting the embeddedsecret messages in the low frequency components of the cover image afterapplying wavelet transform followed by a sorting process and the coefficients ofsecret messages after applying Huffman encoding and using binary to multilevelto reading the string of message reducing by multiplying in attenuation factorbefore adding them with those of the cover image.The experimental results show that the algorithm has a high capacity and a goodinvisibility, Moreover PSNR of stego image shows the better results the PSNRabove 40 dB, the proposal system was activated according to attacker noise isaddition and JPEG compression application are used with out detection the secretmessage.


Article
Secret Technique To Hiding Image After Compression In Cover Image

Authors: Ammar Abdul-Amer Rashed --- Aymen Dawood Salman --- Saddam Kamil Alwane
Journal: Engineering and Technology Journal مجلة الهندسة والتكنولوجيا ISSN: 16816900 24120758 Year: 2011 Volume: 29 Issue: 10 Pages: 1991-2003
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

This paper presents a technique for image compression and hiding in image of a high secret has been applied to wavelet transform and wavelet transform packet first apply two dimensional wavelet transform packet on the cover image was analysis and resorting to (Secret Sub bands level) of the cover image has secret algorithm either the image you want to hide has been compressed using two dimensional wavelet transform and then the application (Hard Thresholding) in order to reduce the values of the image and was also re-sorting to the transactions analysis (Secret Sub-band level) of the secret image(compressed image) Through a secret algorithm and then was minimized transaction values of sub bands level of image want to hide, the key used (random generated Key )to hide the secret, andthis system has the property of the secret high in the process of concealment and the distribution of transactions analyzed for the image want to hide After the hitwas so secret key and collected(adding) with the sub band level of the cover imageon the adoption of the proposal are known algorithm with the secret key for boththe sender and the receiver.

Listing 1 - 2 of 2
Sort by
Narrow your search

Resource type

article (2)


Language

English (2)


Year
From To Submit

2011 (2)