Steganography technique hiding text in image pixels [10]

Steganography technique hiding text in image pixels [10]

Source publication
Article
Full-text available
span>These days there are many security issues facing users while they are using the internet for exchanging information among them. And, users use technology devices, such as mobiles and computers, and they connect them to the network and internet. Therefore, users always looking for a safe way to exchange information locally and globally, when th...

Contexts in source publication

Context 1
... it is very essential to tune the algorithms correctly, because the human eyes and ears can distinguish various and comparable frequencies and colors [9]. Figure 1 shows the main idea of the steganography of image pixels. On the other hand, cryptography is known as the science of securing texts from outside observers, and it is an encryption technique that takes the original statement (plaintext) and turns it into ciphertext, which is incomprehensible. ...
Context 2
... the image pixel values have been changed, however, the quality of the image is remaining the same in resolution and size. As the image is generated randomly and is not a famous image or known photo, Figure 10 shows the process of hiding the text value binary in the generated image. After that, a more complex step will start to provide a more secure environment for hidings techniques, and this is by hiding the newly generated image from the previous step that holds the encrypted message text into the audio file with the ".wav" file format. ...
Context 3
... is an enormous range of some values in the audio file so that there will be enough space to store the image pixel values into the audio values. Later, as the final step, the audio file will be generated with text hidden inside the image and the image itself hidden inside the newly generated audio file, without changing the quality of the sound, Figure 11 shows the process of hiding image data in the sound file. Figure 11. ...
Context 4
... as the final step, the audio file will be generated with text hidden inside the image and the image itself hidden inside the newly generated audio file, without changing the quality of the sound, Figure 11 shows the process of hiding image data in the sound file. Figure 11. Embed generated image into the audio file To get the encrypted text inside the image and audio file at the front end of the permitted user with a decoding algorithm, the decryption process starts. ...
Context 5
... the combination of characters is set to the reverse order, in the final stage, the original text is shown. Figure 12 illustrates the stages of decryption and extracting the original text. ...
Context 6
... it can be noticed that the image that wants to be used as a medium for the steganography process is generated randomly with three color channels which are RGB, and mixed colors from these RGB, as it is shown in Figure 13. Hence, the generated image is not understood or illustrious to anyone, it is just random colors of rectangles. ...
Context 7
... it gives a benefit for the proposed algorithm, which can hide text in the image with any changes that happen to the image quality, and ordinary people will not detect any changes and will not get the text. Figure 14 shows the comparison between the original and manipulated images, Figure 14 After that, the image with the text inside goes to the next step which is inserting the image into the sound data with the respect to the frequency rate value. Also, the quality of the generated sound remains the same, there is not any kind of added noise or echo in the newly generated sound. ...
Context 8
... it gives a benefit for the proposed algorithm, which can hide text in the image with any changes that happen to the image quality, and ordinary people will not detect any changes and will not get the text. Figure 14 shows the comparison between the original and manipulated images, Figure 14 After that, the image with the text inside goes to the next step which is inserting the image into the sound data with the respect to the frequency rate value. Also, the quality of the generated sound remains the same, there is not any kind of added noise or echo in the newly generated sound. ...
Context 9
... technique in this step is to find the spaces among the sound frequencies, then hide the data inside, which are bits of image pixel plus the text messages. As a result, the algorithm shows that the sound quality did not change or the size does not increase that much to be noticed, as it is shown in Figure 15. The generated sound with the image and text hidden inside the quality does not change compared to the original image shown in Figure 15 However, the algorithm needs a key to decrypt the original text from the sound and the image data. ...
Context 10
... a result, the algorithm shows that the sound quality did not change or the size does not increase that much to be noticed, as it is shown in Figure 15. The generated sound with the image and text hidden inside the quality does not change compared to the original image shown in Figure 15 However, the algorithm needs a key to decrypt the original text from the sound and the image data. So, the recipient needs to have key decryption for the whole process. ...

Similar publications

Article
Full-text available
Text file may be confidential and it can contain secret information that required protection from being hacked. In this research paper a simple method of text files cryptography will be introduced, this method will suit any text file with any size; the sequence of required operations will remain the same without any change even if we change the tex...