Keywords : NC


Use the Frequency Domain to Hide in Some Audio Files

Zahraa Tarik; Farah T. Mohammd; Ikhlass Thanoon; Azhar Rafie

AL-Rafidain Journal of Computer Sciences and Mathematics, 2013, Volume 10, Issue 1, Pages 275-284
DOI: 10.33899/csmj.2013.163458

In this work, anew hiding algorithm is proposed that depends on using two deferent domain (spatial and frequency) to achieve and provide security and protection for transformed data, which is represented in a text message encrypted using a key of direct standard method, then spatial domain were use to hide it inside an audio file, Using Discrete cosine transform (DCT) this file has been hidden inside a host audio file. The data of the text message has been fully retrieved after decrypting process, the value of normalization correlation is equal to one.
 

Hybrid hiding in multimedia files

Farah Tareq Mohammed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2012, Volume 9, Issue 1, Pages 175-185
DOI: 10.33899/csmj.2012.163695

The principle of hybrid information hiding represented by process of information hiding  message (multimedia files) embedded inside another message which is depended on hiding a certain media in another media using different domains (special domain, frequency domain) to provide protection and security for transformed data,  this paper  suggest an algorithm by using two different files first one compressed binary image, the compression method is run-length and hided this file inside the hostage media by use frequency domain which is represented by Discrete cosine transform (DCT), the second is text ciphered by Caesar method which is depended one secret key by using spatial domain.
The data has been retrieved with no error for both text and binary image after deciphering and decompress process completed; the value of normalization correlation factor for both of them is equal to one.
 

Dual Hiding in Digital Image Files

Farah Tareq Mohammed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2011, Volume 8, Issue 1, Pages 131-147
DOI: 10.33899/csmj.2011.163629

The technique of information hiding is one of information security techniques, which works on embedding information on media in such a way that avoid bringing suspicion of discovering transmission between two ends.
In this paper, a modified algorithm is suggested depending on two principles: double information hiding and multiple watermarking. The first principle is represented by cryptography and steganography in a way that each method work separately from the other to ensure a secure content that embedded in the message. While the second principle depends on multiple watermarking represented by images with secret key in a gray image to achieve authentication and accuracy of sending data. Cryptography is used to protect binary image (original watermarking) by using a secret key and embedding more than watermarking (binary and gray images) inside cover file (color image) by using signature (data) that have been taken from the cover file and adopted in the spatial domain for hiding data.