Authentication of data hiding using co-occurrence matrix

Section: Research Paper
Published
Jun 8, 2012
Pages
67-78

Abstract

This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying the authenticity and credibility of the received message. The research designs and implements proposed system for verifying the authenticity of retrieved information which are ciphered and hidden inside colored images. This is done through utilizing the capabilities and features that the process of image texture analysis offers, using the co-occurrence matrix. The message authenticity is verified by comparing the co-occurrence matrices before sending and after receiving in order to assure non infiltration.
Results of applying this system on image files with different extensions, and on text messages with different sizes too, have shown supremacy in fighting spam.

Download this PDF file

Statistics

How to Cite

jader saeed, M., & thanoon, G. (2012). Authentication of data hiding using co-occurrence matrix. AL-Rafidain Journal of Computer Sciences and Mathematics, 9(1), 67–78. https://doi.org/10.33899/csmj.2012.163688
Copyright and Licensing