Esraa Khalid Alobaydi, Omar Muayad Abdullah Aldewachy, R. Alkhayat
{"title":"利用数据库识别的数字图像隐写","authors":"Esraa Khalid Alobaydi, Omar Muayad Abdullah Aldewachy, R. Alkhayat","doi":"10.47577/technium.v10i.9010","DOIUrl":null,"url":null,"abstract":"This paper aims to apply digital image steganography based on a database through some proposed steps, first is converting the stego image(colored image) and covered (original) image into there 24-bit binary representation form, and the second step is segmenting the derived representation from the previous step into regions (sub-images) with size 10 (10*10), the third step is constructing a number of databases, each consists of 100 records and each record contains 24-bit pixel representation, next step is applying shifting process starting from the least significant bit LSB, the number of shifting times is depending on a proposed equation for each record, we repeat this process for each region's database in order to get a more secured information, next step is hiding (embedding) these databases into the covered image depending on a proposed method, finally, we apply a proposed method in order to eliminate any distortion derived after embedding the stego image into the original one after applying the proposed steganography method.\n","PeriodicalId":388226,"journal":{"name":"Technium: Romanian Journal of Applied Sciences and Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Digital Image Steganography Utilizing Database Identification\",\"authors\":\"Esraa Khalid Alobaydi, Omar Muayad Abdullah Aldewachy, R. Alkhayat\",\"doi\":\"10.47577/technium.v10i.9010\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper aims to apply digital image steganography based on a database through some proposed steps, first is converting the stego image(colored image) and covered (original) image into there 24-bit binary representation form, and the second step is segmenting the derived representation from the previous step into regions (sub-images) with size 10 (10*10), the third step is constructing a number of databases, each consists of 100 records and each record contains 24-bit pixel representation, next step is applying shifting process starting from the least significant bit LSB, the number of shifting times is depending on a proposed equation for each record, we repeat this process for each region's database in order to get a more secured information, next step is hiding (embedding) these databases into the covered image depending on a proposed method, finally, we apply a proposed method in order to eliminate any distortion derived after embedding the stego image into the original one after applying the proposed steganography method.\\n\",\"PeriodicalId\":388226,\"journal\":{\"name\":\"Technium: Romanian Journal of Applied Sciences and Technology\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Technium: Romanian Journal of Applied Sciences and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47577/technium.v10i.9010\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Technium: Romanian Journal of Applied Sciences and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47577/technium.v10i.9010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Digital Image Steganography Utilizing Database Identification
This paper aims to apply digital image steganography based on a database through some proposed steps, first is converting the stego image(colored image) and covered (original) image into there 24-bit binary representation form, and the second step is segmenting the derived representation from the previous step into regions (sub-images) with size 10 (10*10), the third step is constructing a number of databases, each consists of 100 records and each record contains 24-bit pixel representation, next step is applying shifting process starting from the least significant bit LSB, the number of shifting times is depending on a proposed equation for each record, we repeat this process for each region's database in order to get a more secured information, next step is hiding (embedding) these databases into the covered image depending on a proposed method, finally, we apply a proposed method in order to eliminate any distortion derived after embedding the stego image into the original one after applying the proposed steganography method.