Please use this identifier to cite or link to this item: https://repository.sustech.edu/handle/123456789/13543
Title: Suitable Steganography Scheme for Securing Data through internet Applications
Other Titles: طريقة إخفاء مناسبة لتأمين البيانات عبر تطبيقات الإنترنت
Authors: Ahmed, Noha Omer Abuelgasim
Supervisor,- Jacqueline George
Keywords: communication Engineering
internet Applications
Securing Data
Issue Date: 20-Mar-2016
Publisher: Sudan University of Science and Technology
Citation: Ahmed , Noha Omer Abuelgasim . Suitable Steganography Scheme for Securing Data through internet Applications / Noha Omer Abuelgasim Ahmed ; Jacqueline George .- khartoum : Sudan University of Science and Technology ,gollce engenerning,2016 ,100p:ill ;28cm .-M.Sc.
Abstract: Steganography is the technique that hides the presence of a secret data in a cover-medium without drawing the attention of unauthorized viewers. So, with the fact that the internet acts as common channel, the problem of information security arise, Steganography is one of the techniques used to resolve this problem. In fact there are many image-based steganography techniques in use, and there are several problems arise due to distortion of stego-image produced after embedding the secret data, and error swill be occurred during restoration the sent image. Therefore, the primary objective of this thesis is to compare between some of them, two in the image spatial domain (LSB and PVD) and the other are in its frequency domain (IWT and DCT). to chose the best one suitable for securing data through internet applications. In order to achieve the goal, the mentioned techniques will be studied, analyzed and evaluated in terms of restored message accuracy and quality of the produced stego-image. Then the graphical user interface (GUI) for the best one will be designed to give easy usage for the program users.
Description: Thesis
URI: http://repository.sustech.edu/handle/123456789/13543
Appears in Collections:Masters Dissertations : Engineering

Files in This Item:
File Description SizeFormat 
Suitable Steganography Scheme ....pdfResearch2.02 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.