Search In this Thesis
   Search In this Thesis  
العنوان
An Adaptive Algorithm for Data Security Using Steganography Techniques /
المؤلف
Abdel-Ghany, Mohammed Salah Reda.
هيئة الاعداد
باحث / Mohammed Salah Reda Abdel-Ghany
مشرف / Gamal Mohammed Behery
مشرف / Ahmed Ahmed El-harby
مشرف / Al-Hussien Seddik Saad
الموضوع
Data Security. Using Steganography Techniques.
تاريخ النشر
2022.
عدد الصفحات
146 P. :
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
الرياضيات
الناشر
تاريخ الإجازة
7/5/2022
مكان الإجازة
جامعة دمياط - كلية العلوم - الرياضيات
الفهرس
Only 14 pages are availabe for public view

Abstract

The purpose of this thesis is to generate a secure coverless steganography system able to protect the sent secret messages. This thesis consists of six chapters, with Arabic and English summaries, in addition to a list of contents, a list of figures and tables, a list of publications, and a list of references.
In chapter 1, we explain some fundamental concepts of steganography and its applications, and the differences between it and cryptography.
In chapter 2, we show the previous related studies about coverless steganography and its advantages and disadvantages.
In chapter 3, we illustrate the main coverless steganography terminology and maze image, its forms, uses and the current techniques for construction it. Also, the concept of QR code is defined, its forms, types, and the current techniques for building it.
In chapter 4, we explained the first proposed system based on coverless steganography in which it generates the maze game image from only the secret message bits. This system is able to secure the sent secret message transmitted from the sender to the receiver. At the receiver side, the maze game image is inserted to the extraction process of that system to retrieve the original secret message. Experimental results are conducted and compared with others to evaluate the system efficiency.
In chapter 5, we explained the second proposed system based on coverless steganography in which it creates QR code image from only the secret message bits and then it generates the maze game image. This system is able to secure the sent secret message transmitted from the sender to the receiver. On the other hand, the maze game image is inserted to the extraction process of that system to retrieve the QR code image from the maze game image after that the original secret message is extracted form that image. Experimental results are conducted and compared with others to evaluate the system efficiency.
In chapter 6, we summarized the conclusion of the thesis. Finally, some research points of future work are introduced.