IIUM Repository

Reversible data hiding scheme based on 3-Least significant bits and mix column transform

Abduallah, Wafaa Mustafa and Rahma, Abdul Monem S. and Pathan, Al-Sakib Khan (2013) Reversible data hiding scheme based on 3-Least significant bits and mix column transform. In: 4th International Workshop on Applications and Techniques in Information Security (ATIS), 26 September 2013, Sydney, Australia. (Unpublished)

[img] PDF (Reversible data hiding scheme based on 3-Least significant bits and mix column transform) - Published Version
Restricted to Registered users only

Download (937kB) | Request a copy
[img] PDF (Reversible data hiding scheme based on 3-Least significant bits and mix column transform) - Supplemental Material
Restricted to Registered users only

Download (22kB) | Request a copy
[img]
Preview
PDF (Reversible data hiding scheme based on 3-Least significant bits and mix column transform) - Supplemental Material
Download (12kB) | Preview
[img]
Preview
PDF (Reversible data hiding scheme based on 3-Least significant bits and mix column transform) - Supplemental Material
Download (1MB) | Preview

Abstract

Steganography is the science of hiding a message signal in a host signal, without any perceptual distortion of the host signal. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researchers how to improve the capacity of hidden data into host image without causing any statistically significant modification. In this work, we propose a reversible steganography scheme which can hide large amount of information without affecting the imperceptibility aspect of the stego-image and at the same time, it increases the security level of the system through using different method for embedding based on distinct type of transform, called Mix Column Transform. Our experimental results prove the ability of our proposed scheme in balancing among the three critical properties: capacity, security, and imperceptibility.

Item Type: Conference or Workshop Item (Full Paper)
Additional Information: 6481/32252
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Dr. Al-Sakib Khan Pathan
Date Deposited: 08 Oct 2013 12:50
Last Modified: 08 Oct 2013 12:50
URI: http://irep.iium.edu.my/id/eprint/32252

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year