Adaptive Hiding Algorithm Based on Mapping Database

Authors

  • Ismael AbdulSattar Jabbar College of science, Computer department, University of Mustansiriyah, Iraq, Baghdad.
  • Shaimaa Hameed Shaker Computer department, University of technology, Iraq, Baghdad.

DOI:

https://doi.org/10.3991/ijim.v17i01.36723

Keywords:

Information hiding, Hash function, message digest 5 (MD5), Database, stego-systems.

Abstract


Information hiding one of the important field of security which provide secure level for the information. Achieving multi levels of security system often researchers used cryptography side by side with steganography. Utilizing message digest algorithm to play the role of crypto which is extracted from secret created database. Message digest algorithm (MD5) used two times as one-way function to provide data integrity. The implemented system evaluated based on peak signal to noise ratio (PSNR) metric and the best value reaches 62.46. the proposed system works in adaptive behavior due to the different use of images as well as the selected point could be used to generate the hash code as well. The implemented system reaches up to sufficient level of security through using both steganography and cryptography.

Downloads

Published

2023-01-10

How to Cite

Ismael AbdulSattar Jabbar, & Shaimaa Hameed Shaker. (2023). Adaptive Hiding Algorithm Based on Mapping Database. International Journal of Interactive Mobile Technologies (iJIM), 17(01), pp. 96–107. https://doi.org/10.3991/ijim.v17i01.36723

Issue

Section

Papers