Munthir Bahir Tuieb, Hind Jumaa Serteep, Doaa Muhsin Abed Ali
{"title":"Image steganography using Fresnelet transformations, stated coefficients and a pre-processed message","authors":"Munthir Bahir Tuieb, Hind Jumaa Serteep, Doaa Muhsin Abed Ali","doi":"10.47974/jdmsc-1614","DOIUrl":null,"url":null,"abstract":"The method of concealing confidential information inside an image is known as image steganography. In this work, the image steganography technique is developed. The framework is made up of three components: preprocessing of secret messages, selecting coefficients for the hiding process, and the hiring process. The secret message is organized as a two dimentional array, then processed via mathematical equations, which provide more security because the result is an encrypted message. The paper suggests a set of steps to hide the message efficiently. The experimental results show that the suggested method provides a high steganographic quality of the cover image and a high capacity for embedding information, which are two characteristics of a successful steganography technique.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"400 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Discrete Mathematical Sciences and Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47974/jdmsc-1614","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The method of concealing confidential information inside an image is known as image steganography. In this work, the image steganography technique is developed. The framework is made up of three components: preprocessing of secret messages, selecting coefficients for the hiding process, and the hiring process. The secret message is organized as a two dimentional array, then processed via mathematical equations, which provide more security because the result is an encrypted message. The paper suggests a set of steps to hide the message efficiently. The experimental results show that the suggested method provides a high steganographic quality of the cover image and a high capacity for embedding information, which are two characteristics of a successful steganography technique.