M. M. Hadhoud, N. A. Ismail, W. Shawkey, A. Mohammed
{"title":"Secure perceptual data hiding technique using information theory","authors":"M. M. Hadhoud, N. A. Ismail, W. Shawkey, A. Mohammed","doi":"10.1109/ICEEC.2004.1374433","DOIUrl":null,"url":null,"abstract":"As presented in [1,2,3,4,5] the main requirements of data hiding technique is to be secure, high capacity, and perceptual transparency. Several approaches have been proposed in the literature to accomplish this target, all of these techniques are base on several approaches entropy calculations, the modeling of secure steganographic system and the use of secure generated keys the most poweifiul techniques available for the high capacity data hiding. Yet, authors have used only one of these approaches. In this paper, we propose a high capacity data hiding method based on all of these approaches. The proposed technique is characterized by high perceptual transparency and high security level.","PeriodicalId":180043,"journal":{"name":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEEC.2004.1374433","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
As presented in [1,2,3,4,5] the main requirements of data hiding technique is to be secure, high capacity, and perceptual transparency. Several approaches have been proposed in the literature to accomplish this target, all of these techniques are base on several approaches entropy calculations, the modeling of secure steganographic system and the use of secure generated keys the most poweifiul techniques available for the high capacity data hiding. Yet, authors have used only one of these approaches. In this paper, we propose a high capacity data hiding method based on all of these approaches. The proposed technique is characterized by high perceptual transparency and high security level.