Design and Development of a technique for Hidden data in Watermark Image using Steganography: An Exploration
Keywords:
Steganography, Watermarking, Hidden data, CIAAbstract
The improvement of sight and sound and web takes into consideration wide conveyance of computerized media information. It turns out to be significantly less demanding to alter, adjust and copy advanced data. In extra, advanced report is likewise simple to duplicate and appropriate, along these lines it might confront numerous dangers. It ended up plainly important to locate a suitable security because of the centrality, exactness and affectability of the data. Besides, there is no formal technique to be taken after to find shrouded information. In this paper, we proposed an approach amongst Steganography and Watermarking. In this paper, another data concealing framework is introduced. The point of the proposed framework is to shroud data (information document) inside watermark picture. This paper covers three fundamental standards of security: Confidentiality, Integrity and Authentication (CIA).
References
[1] A.A.Zaidan, B.B.Zaidan, Fazidah Othman, “New Technique of Hidden Data in PE-File with in Unused Area One”, International Journal of Computer and Electrical Engineering (IJCEE), Vol.1, No.5, ISSN: 1793-8198, pp 669-678.
[2] Al-Nabhani, Y.; Zaidan, A.A.; Zaidan, B.B.; Jalab, H.A.; Alanazi, H.O.; “A new system for hidden data within header space for EXE-File using object oriented technique” 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT),Volume:7, Pages:9-13, Digital Object Identifier: 10.1109/ICCSIT.2010.5564461.
[3] A.W. Naji, Shihab A. Hameed, B.B.Zaidan, Wajdi F. Al-Khateeb, Othman O. Khalifa, A. A. Zaidan and Teddy S. Gunawan, ” Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques ”, International Journal of Computer science and information security, IJCSIS Vol.3, No. 1, July 2009, ISSN:1947-5500.
[4] Alaa Taqa, A.A Zaidan, B.B Zaidan.”New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm ”, International Journal of Computer and Electrical Engineering, Vol. 1, No. 5 December, 2009,ISSN:1793-8163.
[5] Vimal Bibhu, “On Line Secret Watermark Generation for Audio files ”, International Journal of Computer and Electrical Engineering, Vol. 1, No. 5 December, 2009 ISSN:1793-8163.
[6] Jafari, R.; Ziou, D.; Mammeri, A.;” Increasing compression of JPEG images using steganography ” , 2011 IEEE International Symposium on Robotic and Sensors Environments (ROSE), Page(s): 226 - 230 , Digital Object Identifier: 10.1109/ROSE.2011.6058519.
[7] M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.
[8] M. Reid, R. J. Millar, and N. D. Black, "Second-generation image coding: an overview," ACM Computing Surveys (CSUR), vol. 29, pp. 3-29, 1997.
[9] Chopra D.; Gupta P.; Gaur S. B.C.; Gupta A.; “Lsb Based Digital Image Watermarking For Gray Scale Image,” IOSR Journal of Computer Engineering, 2012. IOSRJCE 2012, vol.6, pp. 36, 41, Sep. -Oct. 2012.
[10] Mohammad Shirali-Shahreza and Sajad Shirali-Shahreza, “Steganography in Silence Intervals of Speech”, Institute of Electrical and Electronics Engineers (IEEE), International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008.
[11] J. Bajpai and A. Kaur, “A literature survey - various audio water-marking techniques and their challenges,” International Conference -Cloud System and Big Data Engineering (Confluence), pp. 451–457,Jan. 2016.
[12] M. Kutter. “Digital Watermarking: Hiding Information in Images” Ph.D. thesis 2045, Swiss Federal Institute of Technology, Lausanne, Switzerland, 1999.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
