STEGANOGRAPHY

dc.contributor.advisorJamal Khrousheh
dc.contributor.authorJawad T. Abdulrahman
dc.contributor.authorJihad M. Abdo
dc.contributor.authorMuhammad H. Bani-Shamseh
dc.date.accessioned2017-11-21T12:29:19Z
dc.date.available2017-11-21T12:29:19Z
dc.date.issued2010
dc.description.abstractIn this research we propose a system of communication between two parties in a secure channel; the message to be transmitted, which is a text, is first compressed using Huffman coding technique, and then a cover, gray scale image C  is used to hide the message inside, the resulting image is S  (the stego image). At the receiver, first the compressed message is extracted from the stego image, and then it is de-compressed to recover the original message. Our aim is to hide maximum amount of information, with least error in the stego image (BER) so that no other party knows that there is hidden informationen
dc.identifier.urihttps://hdl.handle.net/20.500.11888/11776
dc.titleSTEGANOGRAPHYen
dc.typeGraduation Project
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Steganography.docx
Size:
248.57 KB
Format:
Microsoft Word XML
Description: