Authentication of data hiding using co-occurrence matrix | ||
AL-Rafidain Journal of Computer Sciences and Mathematics | ||
Article 22, Volume 9, Issue 1, June 2012, Pages 67-78 PDF (781.84 K) | ||
Document Type: Research Paper | ||
DOI: 10.33899/csmj.2012.163688 | ||
Authors | ||
Melad jader saeed1; Ghada thanoon2 | ||
1College of Computer Science and Mathematics University of Mosul, Iraq | ||
2University of Mosul/ College of Computer Science and Mathematics | ||
Abstract | ||
This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying the authenticity and credibility of the received message. The research designs and implements proposed system for verifying the authenticity of retrieved information which are ciphered and hidden inside colored images. This is done through utilizing the capabilities and features that the process of image texture analysis offers, using the co-occurrence matrix. The message authenticity is verified by comparing the co-occurrence matrices before sending and after receiving in order to assure non infiltration. Results of applying this system on image files with different extensions, and on text messages with different sizes too, have shown supremacy in fighting spam. | ||
Keywords | ||
Data Hiding; authentiacation; co-occurrence; cipher | ||
Statistics Article View: 160 PDF Download: 221 |