ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Message Hiding with Pseudo-Random Binary Sequence Utilization

Proceeding: The Third International Conference on Computing Technology and Information Management (ICCTIM)

Publication Date:

Authors : ; ; ;

Page : 25-31

Keywords : Steganography; SSIM; DCT; DWT; Social Network.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

This paper presents a novel computational secret message hiding technique, also called Code-booked steganography technique based on Code Division Multiple Access (CDMA) technology with having regard to security and perceptibility of hidden message. This CDMA technique and their variations have mainly exploitation in mobile phone communication standards, the world's most widely used cell phone standard. We model the cover object transmission over two interacting social networks using a user based model in which we apply the fundamental principles of the steganography. We show that the imposed features of CDMA techniques agree with imperatives claimed upon steganography systems and it facilitates the creation of an unsuspicious communication channel.

Last modified: 2018-03-18 16:39:32