تعداد نشریات | 21 |
تعداد شمارهها | 593 |
تعداد مقالات | 8,812 |
تعداد مشاهده مقاله | 66,762,977 |
تعداد دریافت فایل اصل مقاله | 7,326,071 |
Using LU analysis to encryption the images formed after steganography of image into another image | ||
International Journal of Nonlinear Analysis and Applications | ||
مقاله 22، دوره 13، شماره 2، مهر 2022، صفحه 227-235 اصل مقاله (831.48 K) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22075/ijnaa.2022.6240 | ||
نویسندگان | ||
Mohammed Abdul Hameed Jassim Al-Kufi1؛ Hussein Abbas Shniar Al-Salihi* 2 | ||
1Department of Mathematics, Faculty of Basic Education, University of Kufa, Iraq | ||
2Department of Mathematics, Faculty of Computer science and mathematics, University of Kufa, Najaf, Iraq | ||
تاریخ دریافت: 19 آذر 1400، تاریخ بازنگری: 06 بهمن 1400، تاریخ پذیرش: 20 بهمن 1400 | ||
چکیده | ||
In this research, we will hide an image we call the secret image inside another image we call the repository. After converting the color values of both images from decimal to binary, we copy the stored images into four copies and use the eighth and seventh bits of these copies to hide the full bits of the secret image starting with the first. Two to be replaced in the eighth and seventh parts, respectively in the first version, then we hide the third and fourth bits of the secret image in the eighth and seventh parts, respectively, of the second version of the repository images, after that we hide the fourth and fifth parts of the secret image in the eighth and seventh parts of The third version of the repository image, then finally we put the last two bits of the secret image in the eighth and seventh parts of the fourth version of the image After that, we retrieve the color values of the images formed from the binary system to the decimal system so that we have four new warehouse images, but the secret image that did not show any features in the images roduced in order to strengthen the masking process, we encrypt those formed images using one of the mathematical analyzes within the field of analysis Numerical, which is the analysis of LU factors, which analyzes the image or divides it into two images, and we will see this through the working methodology. | ||
کلیدواژهها | ||
Cryptography؛ Steganography؛ LU factorization؛ Digital images | ||
مراجع | ||
[1] M. Alasdair, An introduction to digital image processing with Matlab, Course Technology, 2004. [2] M.A.F. Al-Husainy and D.M. Uliyan, Image steganography technique based on extracted chains from the secret key, J. Engin. Appl. Sci. 13 (2018), 4235–4244. [3] S. Almuhammadi and A. Al-Shaaby, A survey on recent approaches combining cryptography and steganography Computer Science, Information Technology (CS IT), 2017. [4] K.I. Al-Saif and A.S. Abdullah, Color image enhancement based on contourlet transform coefficients, Aust. J. Basic Appl. Sci. 7 (2013), no. 8, 207–213. [5] P. Anita, Numerical analysis, National Institute of Technology Durgapur, Durgapur-713209. [6] S. Adjerid, Notes for numerical analysis, Math 4445, Virginia Polytechnic Institute and State University. [7] T.S. Barhoom and S.M. AMousa, A steganography lsb technique for hiding image within image using blowfish encryption algorithm, Int. J. Res. Eng. Sci. 3 (2015), 61–66. [8] M. Douglas, K. Bailey, M. Leeney and K. Curran, An overview of steganography techniques applied to the protection of biometric data, Multi.Tools Appl. 77 (2018), 17333–17373. [9] D. Gollmann, Computer security Wiley interdisciplinary reviews, Comput. Statist. 2 (2010), 544–554. [10] M.M. Hashim, M.S.M. Rahim, F.A. Johi, M.S. Taha, A.A. Al-Wan and N.N. Sjarif, An extensive analysis and conduct comparative based on statistical attach of LSB substitution and LSB matching, Int. J. Engin. Technol. 7 (2018), 4008–4023. [11] J. Katz, A.J. Menezes, P.C. Van Oorschot and S.A. Vanstone, Handbook of applied cryptography, CRC Press. 1996. [13] S.A. Laskar and K. Hemachandran, Combining JPEG steganography and substitution encryption for secure data communication, Computer Science & Information Technology, 2012. [14] W.R. Matthew, Pivoting for LU factorization, University of Puget Sound, 2014. [15] S. Mishra, V.K. Yadav, M.C. Trivedi and T. Shrimali, Audio steganography techniques, A Survey in Advances in Computer and Computational Sciences, Springer, Singapore, 2018, p. 581–589. [16] T. Morkel, Image steganography applications for secure communication Doctoral dissertation, University of Pretoria, 2012. [17] K. Muhammad, J. Ahmad, M. Sajjad and M. Zubair, Secure image steganography using cryptography and image transposition, arXiv preprint arXiv:1510.04413. 2015. [18] V. Nagarajan, N.K. Abitha Gladis and D. Nagarajan. Compression and denies of an image by LU and QR decomposition, Int. J. Res. Engin. Appl. Sci. 6 (2016), no. 9, 1–4. [19] F.A.P. Petitcolas, Information hiding: a survey, Proc. IEEE 87 (1999), no. 7, 1062–1078. [20] G. Phillip, M. Walter and H.W. Margaret, Numerical linear algebra and optimization, Addison-Wesley Publishing Company, 1991. [21] M.H. Qasim, New Metrics for steganography algorithm quality, Int. J. Adv. Sci. Technol. 29 (2020), no. 2. [22] L. Riccardo and B. Mauro, Lossless compression of encrypted grey-level and color images, 16th Eur. Signal Process. Conf. (EUSIPCO 2008), Lausanne, Switzerland, 25 (2008), no. 29, p. 1-5. [23] D.R. Sridevi, P. Vijaya and K.S. Rao, Image steganography combined with cryptography council for innovative, Council Innov. Res. Peer Rev. Res. Pub. Syst. J. 9 (2013), no. 1. [24] A. Schwarzenberg-Czerny, On matrix factorization and efficient least squares solution, Astron. Astrophys. Suppl. Ser. 110 (1995), no. 405, 110–405. | ||
آمار تعداد مشاهده مقاله: 43,787 تعداد دریافت فایل اصل مقاله: 785 |