Keywords : Information Hiding

Hybrid Method between the Discrete Wavelets Translate Technique and the Chaos System Based by the Least Significant Bit Algorithm to Encrypt and Hide a Digital Video File

Hasan Maher Ahmed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 1, Pages 37-52
DOI: 10.33899/csmj.2020.163508

The use of computers today is the most important and widespread means of storing, retrieving and circulating information through local and international networks and smart phones. Thus it is possible to intercept information through different networks or access to computers, whether independent or connected with the network for the purpose of viewing its contents or stealing information or to tamper with, and in this light must ensure the protection, reliability and credibility of information and preservation of the emergence of various means of protection such as the use of encryption and techniques of hiding or coverage of information.
This research is based on a hybrid method between the Discrete Wavelets Translate technique (DWT) and the Chaos system based on the Least Significant Bit algorithm (LSB) to encrypt and hide a digital video file within another digital video that represents the cover by inserting the digital video file and segmenting it into a set of frames and then analyze each frame to its colors (red, green and blue) and then study the color values ​​of each frame and the process of encryption based on the equation of the logistics function (chaotic functions), and the application of the Discrete Wavelets Translate technique on the color slides of the cover frame. The hiding process is done using the Least Significant Bit algorithm based on the logistic function by calculating the series of random locations of cover area.
The results showed that the hybridization of the Discrete Wavelets Translate technique and the chaos system based on the Least Significant Bit algorithm was an effective method for encrypting and hiding digital video files. After applying the work algorithms to a set of samples, the results showed consistency and compatibility in the encrypting and hiding process with the samples that was dealt with.

Hiding digital image watermarking in a sound signal using Wavelet Transform and Singular Value Decomposition

Alyaa Moufaq Abdul Majeed Haleem; AlAA Zakaria

AL-Rafidain Journal of Computer Sciences and Mathematics, 2013, Volume 10, Issue 4, Pages 65-83
DOI: 10.33899/csmj.2013.163557

The outgrowing of multimedia applications in communications network brought about an increasing need to provide qualified methods to protect these media and secure communication. These methods include encryption and information hiding.
In this research, a new method has been improved to hide watermarking image in voice signal then send it through the network with no effect on the cover sound through the hiding process. This method is performed by applying two ways. The first one is the discrete wavelet transform (DWT) while the second one is singular value decomposition (SVD) by using wavelet transform, we get detail values which are arranged in a specific way and then entered to the singular value decomposition algorithm.  Finally we get eign values, which embedding the data of the watermark image inside these values. So, we get the watermark signal with no effects. Also, the recovered image efficiency measurement is performed by using the correlation coefficient between the original and the recovered watermark image and also we apply the measurement of the difference between the original voice signal (cover) and the watermarked voiced signal by using signal to noise ratio (SNR). Matlab is the approval as a programming language in this paper.

Information Hiding Techniques Using Network Protocols

Manar Younis Kashmola; Ameera Bibo Sallo

AL-Rafidain Journal of Computer Sciences and Mathematics, 2011, Volume 8, Issue 2, Pages 35-50
DOI: 10.33899/csmj.2011.163650

The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and use TCP protocol in designing covert channel by using Urgent Pointer  field, and UDP by using Source Port field. Finally ICMP protocol by using Echo request message and Message field.
 The result of Covert channel after analyzing the protocols (IP, TCP, UDP, ICMP) header depends on the field that used in the designing the Covert channel. The access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the other hand depends on a mechanism of unsafe communication. ICMP protocol provided a good transmission, though unreliable, in that the message structure can be unreliable or clear.