Authentication of data hiding using co-occurrence matrix
AL-Rafidain Journal of Computer Sciences and Mathematics,
2012, Volume 9, Issue 1, Pages 67-78
AbstractThis research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying the authenticity and credibility of the received message. The research designs and implements proposed system for verifying the authenticity of retrieved information which are ciphered and hidden inside colored images. This is done through utilizing the capabilities and features that the process of image texture analysis offers, using the co-occurrence matrix. The message authenticity is verified by comparing the co-occurrence matrices before sending and after receiving in order to assure non infiltration.
Results of applying this system on image files with different extensions, and on text messages with different sizes too, have shown supremacy in fighting spam.
- Article View: 57
- PDF Download: 73