Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Mathematical Modelling in Computational and Life Sciences
Guest editors: Ahmed Farouk
Article type: Research Article
Authors: Ahmad, Mostafaa; b; * | Ghoneim, Ahmedd; e | Alshomrani, Salehc; * | Samak, Ahmedb; e | Omar, Naderb | Algarni, Fahadb
Affiliations: [a] Department of Computer Science, Faculty of Computers and Information, Menoufia University, Shebin El-Kom, Egypt | [b] Department of Computer Science, College of Computing and Information, University of Bisha, Saudi Arabia | [c] Department of Computer Science and Artificial Intellgence, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia | [d] Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia | [e] Department of Computer Science, College of Science, Menoufia University, Egypt
Correspondence: [*] Corresponding author. Mostafa Ahmad. E-mail: [email protected].
Abstract: Image steganography provides efficient techniques and methods for embedding secure data into an image. Researchers face many challenges in this field such as: ensuring the quality of the stego image is adequate, ensuring the hidden message is secure, increasing the hiding capacity, recovering the hidden message and the cover image losslessy, and overcoming the effects of lossy image compression on the hidden message. In this paper, we address the above challenges by proposing a new image steganography model to ensure the security of data in cloud storage. The fundamental processes within the base level of the proposed model are to preprocess both the cover image and the secret message. The cover image is transformed to the wavelet domain using integer-to-integer transform while the secret message is compressed using lossless entropy coding and then it is encrypted for additional security before embedding. The control level of the model drives the steganography process as follows. Firstly, it selects significant coefficients from the transformed cover image according to some threshold values. Then, it creates groups of 7-bits and 3-bits from non-lossy bits of selected significant coefficients and the encrypted bit stream of the secret message, respectively. Finally, the non-lossy bits in the selected significant coefficients are updated by injecting the secret bits. Through the process of steganography, the consistency between the payload of the secret message and the number of selected significant coefficients is checked. The model is validated and verified using extensive real experiments. Moreover, the performance of the proposed model is measured by comparison with other recent models.
Keywords: Integer wavelet transform (IWT), embedded zero-tree wavelet (EZW), data hiding image steganography, stego-image quality
DOI: 10.3233/JIFS-179563
Journal: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 3, pp. 2777-2788, 2020
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]