University of Bahrain
Scientific Journals

Un-Imperceptible Image Steganography Approach (U-IISA) in Excel sheet

Show simple item record Al-anni, Maad Kamal Almuttairi, Rafah M. Alsaadi, Husam Ibrahiem Husain 2020-07-20T17:14:50Z 2020-07-20T17:14:50Z 2020-11-01
dc.identifier.issn 2210-142X
dc.description.abstract obliquely, the obfuscation becomes the vital mannerism for preserving the surreptitious data, so far it is necessary to pay more attention to the art of hiding important images for the purpose of sending crucial decisions through the public media. It is usually happened to hide important data in the image file to keep them away from being hacked illegally. The current work, a unique and efficient method for hiding images in the MS Excel file is proposed, where data can be transferred with speed and security with slight changes in the file size or any doubts from whom previously read its specifications or even the naked eye could not recognize the variation, could be un-imperceptible for interceptors. The proposed method is to hide the colour or gray image with varied sizes impeded in the Excel file in order to be transferred from the sender to the recipient without any change in its resolution. It also involves transferring the colored image with its resolution details if the recipient is interested in such details, or it could be transferred as a gray image if the color is not a required datum. In both cases, the color does not affect the safety instead of the involving speed through the process of sending and the speed of image recovery by the recipient where the size of the data decreased, the main strength of Propose System is the method does not affect the file used for hiding along with the mannerism of handling the information header with its technique is unique so far being involved in literature survey. Wheras there is no difference in the technology of embedding, but a difference in the method of embedding, we do not use traditional approach or sequential approach to embed the data, we use zigzag approach, and likewise, the coding method is unconventional, it is new approach as we mentioned in the manuscript. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International *
dc.rights.uri *
dc.subject Steganography en_US
dc.subject Encryption en_US
dc.subject Gray and Colour Image en_US
dc.subject MS –Excel Sheet en_US
dc.subject Least Significant Bit(LSB en_US
dc.title Un-Imperceptible Image Steganography Approach (U-IISA) in Excel sheet en_US
dc.type Article en_US
dc.volume 9 en_US
dc.issue 6
dc.pagestart 1263 en_US
dc.pageend 1274 en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US

Files in this item

The following license files are associated with this item:

This item appears in the following Issue(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 International Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International

All Journals

Advanced Search


Administrator Account