Jinan N. Shehab
University of Diyala

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Robust large image steganography using LSB algorithm and 5D hyper-chaotic system Jinan N. Shehab; Hussein A. Abdulkadhim; Taqwa F.H. Al-Tameemi
Bulletin of Electrical Engineering and Informatics Vol 10, No 2: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i2.2747

Abstract

This paper contains a robust hiding system proposed to hide and reconstruct efficiently a large size secret image based on merging encrypting and hiding. This approach deals with a video utilized as a cover of frames to hide the blocks of large image inside it. Frames are selected according to 5D hyperchaotic algorithms and consequently change value of the pixel in the original image depends on it. Secret image will divide into many blocks and hide each block in one frame selected by 5D chaotic. This method will support and enhance the techniques of information security with less time and morecapacity of transmission. The results obtained are analyzed under criteria including: Peak signal to noise ratio, Mean square error, key space and sensitivity, correlation coefficient and capacity of hiding. The results demonstrate both of the secret color image and cover video, where retaining its explicitness and properties after reconstruction in the receiver. However, the results prove stability and reliability of the proposed system under several conditions and can avoid attacks.
Blind image watermarking scheme based on lowest energy contourlet transform coefficient and modified arnold cat/ikeda maps Jinan N. Shehab; Hussein A. Abdulkadhim; Yousif Allbadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i1.pp196-207

Abstract

The widespread of global internet has led to the need for developing new methods of protecting multimedia information from exploitation, alteration or forgery, illegal distribution, and manipulation. An attacker is quickly and illegally distributing or changing multimedia information by using various means of computer technology. For detecting this manipulation, this paper suggests blind watermark image inside a host image for observing in the receiver. If the watermark image was retrieved, then the host image was not attacked or manipulated. While if not retrieved, in this case, the image was attacked. The proposed method is depending on a decomposition of the host image using lowest energy sub-bands of Contourlet transform (4-levels), with scrambling by Ikeda map of the watermark image, and selecting new positions by modified Arnold Cat map. This will produce more security and safety, as well as provide more difficulty or prevent hacking. The obtained results confirm the robustness against attacks and more effectiveness of the presented scheme compared with the other similar works. Also, using lowest energy sub-bands will expand area of embedding and this part will be considered in the future works with the color images.