The great and rapid development that is taking place in the areas of data transmission, the Internet, and multimedia has become a basic approach to life, and because of that, it has become necessary to provide modern and developed methods to protect private information from theft and eavesdropping by unauthorized persons. Steganography, a form of art or science that is used to conceal private information from uninvited parties, is one of the most crucial of these techniques. This technique is distinguished by hiding the secret message in a different medium known as the cover medium, in addition to obscuring the fact that there is a data transfer. In this research, a new method was proposed and applied to hide the data. The discrete shearlet transform is applied to transform the cover image into a frequency domain where the secret message will be hidden. The quad chain code technique is then used to extract the boundaries of the object in the cover image, and a series of pixels are taken from these edges to include the secret message and then hide it using the least significant bit (LSB).
Skip Nav Destination
,
Article navigation
19 November 2024
THE 5TH INTERNATIONAL CONFERENCE ON BUILDINGS, CONSTRUCTION, AND ENVIRONMENTAL ENGINEERING: BCEE5
21–23 November 2023
Amman, Jordan
Research Article|
November 19 2024
Modern steganography method based on Shearlet transformation with quad chain code Available to Purchase
Maha Monther Mohamed;
Maha Monther Mohamed
a)
1
Computer Science Department, College of Computer and Mathematics, University of Mosul
, Mosul-Iraq
a)Corresponding author: [email protected]
Search for other works by this author on:
Ahmed Sami Nori
Ahmed Sami Nori
b)
2
Cyber Security Department, College of Computer and Mathematics, University of Mosul
, Mosul-Iraq
Search for other works by this author on:
Maha Monther Mohamed
1,a)
Ahmed Sami Nori
2,b)
1
Computer Science Department, College of Computer and Mathematics, University of Mosul
, Mosul-Iraq
2
Cyber Security Department, College of Computer and Mathematics, University of Mosul
, Mosul-Iraq
a)Corresponding author: [email protected]
AIP Conf. Proc. 3219, 030005 (2024)
Citation
Maha Monther Mohamed, Ahmed Sami Nori; Modern steganography method based on Shearlet transformation with quad chain code. AIP Conf. Proc. 19 November 2024; 3219 (1): 030005. https://doi.org/10.1063/5.0243542
Download citation file:
Pay-Per-View Access
$40.00
Sign In
You could not be signed in. Please check your credentials and make sure you have an active account and try again.
11
Views
Citing articles via
The implementation of reflective assessment using Gibbs’ reflective cycle in assessing students’ writing skill
Lala Nurlatifah, Pupung Purnawarman, et al.
Effect of coupling agent type on the self-cleaning and anti-reflective behaviour of advance nanocoating for PV panels application
Taha Tareq Mohammed, Hadia Kadhim Judran, et al.
Classification data mining with Laplacian Smoothing on Naïve Bayes method
Ananda P. Noto, Dewi R. S. Saputro
Related Content
A review of steganography techniques
AIP Conf. Proc. (February 2024)
Image steganography based on the Flamingo search algorithm
AIP Conf. Proc. (February 2025)
Review of secure the online multimedia data using chaotic map and steganography techniques
AIP Conf. Proc. (October 2021)
Image steganography using LSB embedding and edge adaptive approach
AIP Conf. Proc. (May 2023)
Steganography protocols for quantum channels
J. Math. Phys. (August 2020)