Mostrar el registro sencillo del ítem

dc.contributor.authorAl-asadi, Tawfiq A.
dc.contributor.authorHadi Ali, Israa
dc.contributor.authorkareem Abdul Abdul Abdul kadhem, kadhem
dc.date2015
dc.date.accessioned2020-06-12T09:38:27Z
dc.date.available2020-06-12T09:38:27Z
dc.identifier.issn1989-1660
dc.identifier.urihttps://reunir.unir.net/handle/123456789/10170
dc.description.abstractThis paper presents a new approach for hiding the secret image inside another image file, depending on the signature of coefficients. The proposed system consists of two general stages. The first one is the hiding stage which consist of the following steps (Read the cover image and message image, Block collections using the chain code and similarity measure, Apply DCT Transform, Signature of coefficients, Hiding algorithm , Save information of block in boundary, Reconstruct block to stego image and checking process). The second stage is extraction stage which consist of the following steps ( read the stego image, Extract information of block from boundary, Block collection, Apply DCT transform, Extract bits of message and save it to buffer, Extracting message).es_ES
dc.language.isoenges_ES
dc.publisherInternational Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI)es_ES
dc.relation.ispartofseries;vol. 3, nº 5
dc.relation.urihttps://www.ijimai.org/journal/bibcite/reference/2509es_ES
dc.rightsopenAccesses_ES
dc.subjectinformation technologyes_ES
dc.subjectsteganographyes_ES
dc.subjectchain codees_ES
dc.subjectDCTes_ES
dc.subjectIJIMAIes_ES
dc.titleA New Approach for Hiding Image Based on the Signature of Coeficientses_ES
dc.typearticlees_ES
reunir.tag~IJIMAIes_ES
dc.identifier.doihttps://doi.org/10.9781/ijimai.2015.352


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem