Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Data Hiding by Unsupervised Machine Learning Using Clustering K-mean Technique

Hiba Hamdi Hassan; Maisa'a Abid Ali Khodher

Volume 21, Issue 4 , December 2021, , Page 37-49


  Steganography includes hiding text, image, or any sentient information inside another image, video, or audio. It aims to increase individuals’ use of social media, the internet and web networks to securely transmit information between sender and receiver and an attacker will not be able to detect ...  Read More ...

Comparison of Three Proposal Methods in Steganography Encryption Secret Message using PVD and MapReduce

Huda Ghazie Abd UL Sahib; Maisa Abid Ali Khodher

Volume 21, Issue 2 , June 2021, , Page 115-131

  This paper will present a comparison between three proposed methods. All of these methodsinclude hiding a secret message inside a video for the aim of transferring it to another party with highsecurity and a high embedding rate in order to ensure that the secret message is not discovered by theattacker. ...  Read More ...

A Development of Least Significant Bit Steganography Technique

Mohammed Majid Msallam

Volume 20, Issue 1 , January 2020, , Page 31-39

  Recently, the world has been interested in transferring data between different devices. The transmission of data must be encrypted so that the intended receiver can only read and process a secret message. Hence, the security of information has become more important than earlier. This paper proposes the ...  Read More ...

Design a Hybrid Cryptosystem Based Chaos and Sharing for Digital Audio

Mahmood Z. Abdullah; Zinah J. Khaleefah

Volume 17, Issue 1 , December 2017, , Page 59-70

  With the growth rate of wireless communication with internet and multimedia. The wireless network has expanded their applications in our life. Cryptography and steganography play important role within data security. This paper chiefly produces a novel hybrid cryptography and steganography for digital ...  Read More ...

A Technique for Image Steganography Based on Optimal Resilient Boolean Functions and DCT

Azhar Malik

Volume 13, Issue 2 , August 2013, , Page 71-80

  Abstract:One of the methods introduced for accomplishing hidden communication is the steganography technique. Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image, text and video without causing ...  Read More ...

Information Hiding in Image Based on Random Locations

Mohsin H. AL-Zohairi

Volume 12, Issue 2 , December 2012, , Page 9-15

  Abstract: Network Security for data transmission is the most vital issue in modern communication systems. This paper discusses a new steganographic technique and the effectiveness of the proposed method is described through which the idea of enhanced security of data can be achieved. To hide data in ...  Read More ...

Improving Hiding Information Process based on GA Technique with Secure Extraction Process

Susan .S. Ghazoul; Lina Saeed Jajo

Volume 10, Issue 1 , December 2010, , Page 98-106

  Abstract: In this paper we propose a new method of hiding information that produces a stego-image which is totally indistinguishable from the original image to extract the hiding message. GA is used as an efficient method to minimize the number of different bits between the cover image and the stego-image ...  Read More ...