A New Data Hiding Technique Based on Irreducible Polynomials
Wafaa Mustafa Abduallah1,
Abdul Monem S. Rahma2, and
Al-Sakib Khan Pathan1
1. Department of Computer Science, International Islamic University Malaysia, Gombak 53100, Kuala Lumpur, Malaysia
2. Department of Computer Science, University of Technology, Baghdad, Iraq
2. Department of Computer Science, University of Technology, Baghdad, Iraq
Abstract—The mass diffusion of digital communication needs the special means of security. Cryptography concentrates on rendering the messages unreadable to any unauthorized person who might intercept those. In contrast, steganography is a method of concealing the existence of message to allow a secure communication in a complete undetectable manner. Digital image is the most common type of carrier used for steganography. This paper presents a new method for data hiding within transform domain of the color images which is based on dividing the image into blocks, then applying the proposed transform on specified blocks and hiding the secret message within them. In this way, the security can be increased since it depends on a different type of transform which is based on irreducible polynomial mathematics. According to our investigation in this area, our work for the first time uses this mechanism for data hiding. The results have proven increasing the capacity with maintaining reasonable level of imperceptibility.
Index Terms— column, transform, irreducible, polynomial, steganography
Cite: Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, "A New Data Hiding Technique Based on Irreducible Polynomials," Journal of Emerging Technologies in Web Intelligence, Vol. 5, No. 1, pp. 45-51, February 2013. doi:10.4304/jetwi.5.1.45-51
Index Terms— column, transform, irreducible, polynomial, steganography
Cite: Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, "A New Data Hiding Technique Based on Irreducible Polynomials," Journal of Emerging Technologies in Web Intelligence, Vol. 5, No. 1, pp. 45-51, February 2013. doi:10.4304/jetwi.5.1.45-51
Array