Un-imperceptible image steganography approach (U-IISA) in excel sheet

dc.contributor.authorAl-Anni, Maad Kamal
dc.contributor.authorAlmuttairi, Rafah M.
dc.contributor.authorAlsaadi, Husam Ibrahiem Husain
dc.date.accessioned2021-05-15T12:49:54Z
dc.date.available2021-05-15T12:49:54Z
dc.date.issued2020
dc.departmentMühendislik ve Doğa Bilimleri Fakültesien_US
dc.description.abstractobliquely, the obfuscation becomes the vital mannerism for preserving the surreptitious data, so far it is necessary to pay more attention to the art of hiding important images for the purpose of sending crucial decisions through the public media. It is usually happened to hide important data in the image file to keep them away from being hacked illegally. The current work, a unique and efficient method for hiding images in the MS Excel file is proposed, where data can be transferred with speed and security with slight changes in the file size or any doubts from whom previously read its specifications or even the naked eye could not recognize the variation, could be un-imperceptible for interceptors. The proposed method is to hide the colour or gray image with varied sizes impeded in the Excel file in order to be transferred from the sender to the recipient without any change in its resolution. It also involves transferring the colored image with its resolution details if the recipient is interested in such details, or it could be transferred as a gray image if the color is not a required datum. In both cases, the color does not affect the safety instead of the involving speed through the process of sending and the speed of image recovery by the recipient where the size of the data decreased, the main strength of Propose System is the method does not affect the file used for hiding along with the mannerism of handling the information header with its technique is unique so far being involved in literature survey. Wheras there is no difference in the technology of embedding, but a difference in the method of embedding, we do not use traditional approach or sequential approach to embed the data, we use zigzag approach, and likewise, the coding method is unconventional, it is new approach as we mentioned in the manuscript. © 2020 University of Bahrain. All rights reserved.en_US
dc.identifier.doi10.12785/ijcds/0906023
dc.identifier.endpage1274en_US
dc.identifier.issn2210-142X
dc.identifier.issue6en_US
dc.identifier.scopus2-s2.0-85096507409
dc.identifier.scopusqualityQ3
dc.identifier.startpage1263en_US
dc.identifier.urihttps://doi.org/10.12785/ijcds/0906023
dc.identifier.urihttps://hdl.handle.net/20.500.12939/1142
dc.identifier.volume9en_US
dc.indekslendigikaynakScopus
dc.institutionauthorAlsaadi, Husam Ibrahiem Husain
dc.language.isoen
dc.publisherUniversity of Bahrainen_US
dc.relation.ispartofInternational Journal of Computing and Digital Systems
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectEncryptionen_US
dc.subjectGray and Colour Imageen_US
dc.subjectLeast Significant Bit(LSBen_US
dc.subjectMS -Excel Sheeten_US
dc.subjectSteganographyen_US
dc.titleUn-imperceptible image steganography approach (U-IISA) in excel sheet
dc.typeArticle

Dosyalar

Orijinal paket
Listeleniyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
İsim:
Un-imperceptible image steganography approach (U-IISA) in excel sheet .pdf
Boyut:
1.41 MB
Biçim:
Adobe Portable Document Format
Açıklama:
Tam Metin/ Full Text