Using B+ Tree To Represent Secret Messages For Steganography Purpose
In this research we suggest a new approach by using B+ tree for storing the secret massages (that want to be sent) in a manner that prevent redundancy of these massages or even sub massages in order to provide efficient memory usage . The proposed system includes two stages: Stores the secret messag...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Unviversity of Technology- Iraq
2010-07-01
|
Series: | Engineering and Technology Journal |
Subjects: | |
Online Access: | https://etj.uotechnology.edu.iq/article_34067_98a04e32e4c2eabe6c99ad4052f47e12.pdf |
_version_ | 1827358233144066048 |
---|---|
author | Suhad M. Kadhem |
author_facet | Suhad M. Kadhem |
author_sort | Suhad M. Kadhem |
collection | DOAJ |
description | In this research we suggest a new approach by using B+ tree for storing the secret massages (that want to be sent) in a manner that prevent redundancy of these massages or even sub massages in order to provide efficient memory usage . The proposed system includes two stages: Stores the secret message and get its unique code by using B+ tree, and retrieves the unique secret message when we have its code by using B+ tree. The proposed system was implemented using Visual Prolog5.1 and after testing, the proposed system gives an efficient time in storing and in retrieving the secret messages, also the proposed method solved the ambiguity problem that some steganography methods suffer from. |
first_indexed | 2024-03-08T06:07:49Z |
format | Article |
id | doaj.art-a74774f866824c108db50939fb53babf |
institution | Directory Open Access Journal |
issn | 1681-6900 2412-0758 |
language | English |
last_indexed | 2024-03-08T06:07:49Z |
publishDate | 2010-07-01 |
publisher | Unviversity of Technology- Iraq |
record_format | Article |
series | Engineering and Technology Journal |
spelling | doaj.art-a74774f866824c108db50939fb53babf2024-02-04T17:46:07ZengUnviversity of Technology- IraqEngineering and Technology Journal1681-69002412-07582010-07-0128155102511210.30684/etj.28.15.1834067Using B+ Tree To Represent Secret Messages For Steganography PurposeSuhad M. KadhemIn this research we suggest a new approach by using B+ tree for storing the secret massages (that want to be sent) in a manner that prevent redundancy of these massages or even sub massages in order to provide efficient memory usage . The proposed system includes two stages: Stores the secret message and get its unique code by using B+ tree, and retrieves the unique secret message when we have its code by using B+ tree. The proposed system was implemented using Visual Prolog5.1 and after testing, the proposed system gives an efficient time in storing and in retrieving the secret messages, also the proposed method solved the ambiguity problem that some steganography methods suffer from.https://etj.uotechnology.edu.iq/article_34067_98a04e32e4c2eabe6c99ad4052f47e12.pdfsteganographytreeinformation hiding |
spellingShingle | Suhad M. Kadhem Using B+ Tree To Represent Secret Messages For Steganography Purpose Engineering and Technology Journal steganography tree information hiding |
title | Using B+ Tree To Represent Secret Messages For Steganography Purpose |
title_full | Using B+ Tree To Represent Secret Messages For Steganography Purpose |
title_fullStr | Using B+ Tree To Represent Secret Messages For Steganography Purpose |
title_full_unstemmed | Using B+ Tree To Represent Secret Messages For Steganography Purpose |
title_short | Using B+ Tree To Represent Secret Messages For Steganography Purpose |
title_sort | using b tree to represent secret messages for steganography purpose |
topic | steganography tree information hiding |
url | https://etj.uotechnology.edu.iq/article_34067_98a04e32e4c2eabe6c99ad4052f47e12.pdf |
work_keys_str_mv | AT suhadmkadhem usingbtreetorepresentsecretmessagesforsteganographypurpose |