- Communities& Collections
- Browse Items by:
- Issue Date
- Author
- Title
- Subject
دراسة إخفاء البيانات القابل للعكس وغير القابل للعكس باستيعاب أنواع مختلفة من الصور.
Data hiding (DH) is an active research area in the information security field. DH technology hides the secret information within digital covers such as images and videos by causing unnoticeable degradation to their quality. It aims to distract the intruders' attention from the existence of secret data within the cover media which makes it preferred by many applications over some conventional security technologies like cryptography that encrypts the message as a sign of the existence of secret data. Copyright protection, media-content authentication and sending patient diagnosis are some emerging applications of DH. DH methods could be reversible or irreversible. Reversibility indicates the possibility of reshaping the exact carrier object once the secret message is retrieved while irreversibility does not guarantee so. Many of the existing DH methods in the literature tried to make a compromise between reducing the distortion of the cover object and increasing the embedding capacity. However, there is a need for more development in this compromise by presenting a more enhanced DH method.
Title: | دراسة إخفاء البيانات القابل للعكس وغير القابل للعكس باستيعاب أنواع مختلفة من الصور. |
Other Titles: | Studying Reversible and Irreversible Data Hiding Accommodating Different Types of Images |
Authors: | Gutub, Adnan Abdul-Aziz Hassan, Fatuma Saeid |
Subjects :: | الحاسب الآلي الحاسب الآلي برامج |
Issue Date :: | 2021 |
Publisher :: | جامعة أم القرى |
Abstract: | Data hiding (DH) is an active research area in the information security field. DH technology hides the secret information within digital covers such as images and videos by causing unnoticeable degradation to their quality. It aims to distract the intruders' attention from the existence of secret data within the cover media which makes it preferred by many applications over some conventional security technologies like cryptography that encrypts the message as a sign of the existence of secret data. Copyright protection, media-content authentication and sending patient diagnosis are some emerging applications of DH. DH methods could be reversible or irreversible. Reversibility indicates the possibility of reshaping the exact carrier object once the secret message is retrieved while irreversibility does not guarantee so. Many of the existing DH methods in the literature tried to make a compromise between reducing the distortion of the cover object and increasing the embedding capacity. However, there is a need for more development in this compromise by presenting a more enhanced DH method. |
Description :: | 87 ورقة |
URI: | http://dorar.uqu.edu.sa//uquui/handle/20.500.12248/130811 |
Appears in Collections : | الرسائل العلمية المحدثة |
File | Description | Size | Format | |
---|---|---|---|---|
24655.pdf " Restricted Access" | الرسالة الكاملة | 3.04 MB | Adobe PDF | View/OpenRequest a copy |
absa24655.pdf " Restricted Access" | ملخص الرسالة بالعربي | 301.21 kB | Adobe PDF | View/OpenRequest a copy |
abse24655.pdf " Restricted Access" | ملخص الرسالة بالإنجليزي | 2.26 MB | Adobe PDF | View/OpenRequest a copy |
cont24655.pdf " Restricted Access" | فهرس الموضوعات | 31.47 kB | Adobe PDF | View/OpenRequest a copy |
indu24655.pdf " Restricted Access" | المقدمة | 432.28 kB | Adobe PDF | View/OpenRequest a copy |
title24655.pdf " Restricted Access" | غلاف | 2.17 MB | Adobe PDF | View/OpenRequest a copy |
Items in D-Library are protected by copyright, with all rights reserved, unless otherwise indicated.
Comments (0)