Data and image encryption through steganography inside an image (MKTEXT-7) and (MK-12,13,14,15)

Message:
Article Type:
Research/Original Article (دارای رتبه معتبر)
Abstract:
We sometimes need to hide data such as texts or images of international paintings or important manuscripts of a high degree of confidentiality and confidentiality, and this is done through several tasks, including archiving or transferring the image of the painting or manuscript to another place. Of course, archiving and preservation are twofold: the first is archiving, documentation and preservation of paper. The second: archiving, documenting and electronic preservation, which is currently the widest due to the digital development in transactions in various fields. In our algorithms, we will hide texts or an image of a global painting located within the abstract art of the artist Dr Luqman Al-Mudhaffar within other images. This is done by hiding the numerical values of the text characters or the color values of the image matrix within the image matrix in which we will hide the text or the image of the global panel that we will call the warehouse image. So that when you look at the image, you see the image of the warehouse, and there is no reference to the text or the image of the global plate. This work, which is considered the secret of hiding the text or the image, will depend on two basic conditions (the first is that the image of the warehouse matches the image of the global board in terms of the number of rows and the number of columns. The second is the use of a secret key to hide and show that only authorized persons know). These two algorithms, which we will call (MKTEXT-7) \& (MK-12), are considered a new method for encoding text and images, and it is one of the products of the great digital development in computer science. Masking and comparisons with readings of previous algorithms. We hope that the results will be at the required level so that we can develop them into more complex algorithms. We will also later combine this algorithm with previous algorithms to come up with a more complex algorithm that intruders cannot decipher.
Language:
English
Published:
International Journal Of Nonlinear Analysis And Applications, Volume:14 Issue: 1, Jan 2023
Pages:
2571 to 2585
https://magiran.com/p2563344  
دانلود و مطالعه متن این مقاله با یکی از روشهای زیر امکان پذیر است:
اشتراک شخصی
با عضویت و پرداخت آنلاین حق اشتراک یک‌ساله به مبلغ 1,390,000ريال می‌توانید 70 عنوان مطلب دانلود کنید!
اشتراک سازمانی
به کتابخانه دانشگاه یا محل کار خود پیشنهاد کنید تا اشتراک سازمانی این پایگاه را برای دسترسی نامحدود همه کاربران به متن مطالب تهیه نمایند!
توجه!
  • حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران می‌شود.
  • پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانه‌های چاپی و دیجیتال را به کاربر نمی‌دهد.
In order to view content subscription is required

Personal subscription
Subscribe magiran.com for 70 € euros via PayPal and download 70 articles during a year.
Organization subscription
Please contact us to subscribe your university or library for unlimited access!