{"title":"基于霍夫曼编码和斐波那契分解的新型隐写系统","authors":"Fadheela Sabri Abu-Almash","doi":"10.30526/31.1.1831","DOIUrl":null,"url":null,"abstract":"Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, and HVS attack.","PeriodicalId":13236,"journal":{"name":"Ibn Al-Haitham Journal For Pure And Applied Science","volume":"39 1","pages":"231-243"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"New Steganography System Based on Huffman Coding and Fibonacci Decomposition\",\"authors\":\"Fadheela Sabri Abu-Almash\",\"doi\":\"10.30526/31.1.1831\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, and HVS attack.\",\"PeriodicalId\":13236,\"journal\":{\"name\":\"Ibn Al-Haitham Journal For Pure And Applied Science\",\"volume\":\"39 1\",\"pages\":\"231-243\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Ibn Al-Haitham Journal For Pure And Applied Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30526/31.1.1831\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ibn Al-Haitham Journal For Pure And Applied Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30526/31.1.1831","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, and HVS attack.