Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
A Novel Steganography Approach for Securing Confidential Personal Data
by
Elqasas, Ali
in
أمن المعلومات
/ إنترنت الأشياء
/ البيانات الشخصية
/ تكنولوجيا المعلومات
2025
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
A Novel Steganography Approach for Securing Confidential Personal Data
by
Elqasas, Ali
in
أمن المعلومات
/ إنترنت الأشياء
/ البيانات الشخصية
/ تكنولوجيا المعلومات
2025
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
A Novel Steganography Approach for Securing Confidential Personal Data
Journal Article
A Novel Steganography Approach for Securing Confidential Personal Data
2025
Request Book From Autostore
and Choose the Collection Method
Overview
In light of significant advancements in information technology and the increasing sophistication of methods used to access confidential information, particularly in critical sectors such as healthcare, intelligence, ATM cards, mobile applications, and the military, the use of steganography has become paramount. Steganography enables the concealment of sensitive data within various forms of multimedia, including videos, images, and sound. This not only secures the information to maintain confidentiality by preventing disclosure the sensitive data by unauthorized, but also conceals the very existence of communication between two entities. Our proposed approach introduces an innovative, lightweight technique that uses the Discrete Cosine Transformation (DCT) coefficients for data hiding according to specific thresholds and the distance between coefficients. Unlike traditional Least Significant Bit (LSB) steganography that operates in the spatial domain, our approach utilizes the frequency domain to enhance the concealment and security of the data. The effectiveness of our method was validated through standard metrics such as CC, MSE, PSNR, SSIM, and Histogram analysis. Three benchmark images (Lena, Baboon, Pepper) with 512x512 dimensions were used in the evaluation. demonstrating promising results. Furthermore, it exhibited robustness against compression by utilizing DCT coefficients from the medium frequency (MF) range. Payload enhancement was achieved by embedding the secret data into an RGB image (49,152 bits) which can be increased if we used a larger size of 512x512 image dimension. Using a 4x4 block size instead of 8x8 is suitable for IoT environments or mobile devices with limited resources while preserving the imperceptibility of modifications needed for each block. We tuned important hyperparameters, including the selection of DCT coefficients and threshold values.by utilizing two pairs of DCT coefficients instead of just one enhancing the security.
Publisher
جامعة جرش
Subject
This website uses cookies to ensure you get the best experience on our website.