24

Executive Committee and Organization - University of Kufa · Mahmoud, Mansour Abed, ... Khalid Eltahir Mohamed, Borhanuddin Mohd. Ali, S.S. Jamuar, Sabira Khatun 340 ... Dr.Mudawi

Embed Size (px)

Citation preview

Executive Committee and Organization

General Chair: Sameer Bataineh

JUST, JORDAN

Program Chair: Eyas El-Qawasmeh

JUST, JORDAN

Reviewing Chair: Basheer Al-Duwairi

UST, JORDAN

Proceeding Chair: Ahmad Dalalah

JUST, JORDAN

Proceeding Message This is the first International Conference on Digital Communications and Computer Applications hosted by the Faculty of Computer and Information Technology at Jordan University of Science and Technology. DCCA 2007 is a forum for scientists and engineers to meet and present their latest research results, ideas, and papers in the diverse areas of Digital Communications, Computer Science, and Information Technology. This scientific conference will cover guest lectures, more than 300 papers for presentations, technical session, and oral poster sessions with debates. This meeting will be a great opportunity to exchange knowledge and experience for all the participants who joined us from all over the world to discuss new ideas in the area of computer science and information technology. We are grateful for the effort of Dr. Eyas El-Qawasmeh, the program chair for making this conference possible, and a special thanks to the technical committee and to all external reviewers. Finally we would like to thank all the participant, sponsoring companies, and Jordan University of Science and Technology. Also we would like to extend a warm welcome you to Jordan, and do hope that all participants have a wonderful time to Jordan in the season of beautiful blossoms. General Chair Prof. Sameer Bataineh Dean of the Faculty of Computer & Information Technology Jordan University of Science & Technology

Preface Dear DCCA2007 proceedings reader:

On behalf of the DCCA2007 conference, the program committee and Jordan University of Science and Technology has the pleasure to welcome the attendees to Jordan University of Science and Technology, Irbid, Jordan to participate in the 1st International Conference on Digital Communications and Computer Applications (DCCA2007).

The DCCA2007 conference explores new advances in information technology. It brought together researcher from various areas of computer science and addresses both theoretical and applied aspects of information technology. The fields of computer science and information technology are growing very fast and there are new technologies that are added every day. Jordan does contribute to these advancements and a proof of this contribution is the large number of presented papers in this international conference.

The DCCA2007 conference offers the opportunity for the researchers from all over the world to get together and discuss the new advances in the area of computer science and information technology. The discussion and exchange ideas will contribute to these fields and will help in more advances in the technology in the coming future.

The call for papers resulted in 45% accepted papers and 18 accepted posters from 47 countries covering all areas of information technology. The papers are of top quality papers. Each paper is evaluated by at least two reviewers. The results of reviewing were paper acceptance, poster acceptance, or paper rejection. In addition, four tutorials and two keynote speakers have been accepted in this conference.

Finally, we hope that the conference satisfy your expectations and hope you enjoy time with us and in Jordan University of Science and Technology. The committees worked hard for not just days but months to reach the quality level that do satisfy our guests, and many thanks and appreciation to all of you who are here today.

Dr. Eyas A. El-Qawasmeh Program chair DCCA2007 Computer Science Department Jordan University of Science and Technology

Table of content

AlGORITHMS

A Canonical Genetic Algorithm for Likelihood Estimator of First Order Moving Average Model Parameter Basa’d Ali Hussain , Rawa’a Dawoud Al-Dabbagh

1

A Water-Saving Technique Based on Distributing of Prime Numbers over Integers Ahmad Sharieh , Adel H. Abusitta , Aladdin H. Baarah

11

A New Approach to Data-Driven Modeling in Civil Engineering Akbar A. Javadi , Mohammad Rezania , Mohaddeseh Mousavi Nezhad

17

VDM Specification of an Algorthm for Graph Decomposition Abdul Huq, Naryanan of an Algoritm for Grapj Decomposition

25

Concept Lattice Reduction by Matrix Decompositions Vaclav Snasel, Petr Gajdos, Hussam M. Dahwa Abdulla, Martin Polovincak

35

Automated Generating Test Cases Using Genetic Algorithms Arabi Keshk, Ahmed M. Omira , Nabil A. Ismail

43

An Algorithm for Generating the Design Matrix for Multivariate Polynomial Least Squares Fitting Sami F. Al-Hamdan

50

COMPUTER ALGORITHMS

Text search algorithm based on stacks Abdurazzag Ali Aburas

55

Weighted maximum likelihood algorithm for time and frequency synchronization of DVB-T systems Charbel El Hajjar , Martin Speitel

60

Three Term Backpropagation Algorithm For Classification Problem Siti Mariyam Shamsuddin , Maslina Darus , Fadhlina Izzah Saman

70

A Genetic Algorithm for Distributed Query Processing over Mirror Servers Azzam Talal Sleit ,Wesam Al-Mbaideen , Nawal Alzabin, Hadeel Dawood , Khaled alqarute

81

ClassifyChi2: An Efficient Discretization Algorithm Ahmad M. Odat , Saleh M. Abu-Soud

88

Two-PASS HORIZON LINE ALGORITHM FOR FAST SHADOW GENERATION OF 3D FUNCTION Tian SHEN, You-xing GAO

99

Using theModulus Adaptive Arrays -Reduced Computational Complexity of the Constrained Multi Householder Transformation Said E. El-Khamy, Fellow IEEE , Darwish M. Abd-Elaziz , Roshdy K. Korayem, IEEE student member

106

Non-uniform Randomized Balanced Allocations Ebrahim Malalla¤

112

COMPUTER DESIGN, ARCHITECTURE , & GRIDS

A Combined hardware-Software Approach for CPU Energy Reduction Using Dynamic Voltage Scaling Technique Diary R. Sulaiman

113

A QoS Matching Approach for Grid Service Selection Yang Liu , HuaCan He

120

A Novel Grid Resource Discovery Model Based on Matchmaking Engine Overlay Yang Liu , HuaCan He

126

objective Mapping for NoC Architectures -MultiAbou El Hassan BENYAMINA , Pierre BOULET

132

Design of an ECC Decoder based on Orthogonal Parity-Checksums Dr. Pervez Akhtar , Engr. M. Altaf Mukati

140

A Method of Reduction of the Microinstructions of Synchronous Digital Systems Shehabat I. M. , Al-Dahleh M. Z.

147

UP-BY TASK SPLITGRID LOCK AVOIDANCE S . Suresh , Ankit Kamal Mehta , C . G . Gayathri

154

Promotion of Local to Global Operation in Train Control System Sher Afzal Khan , Nazir A. Zafar

162

COMPUTER SECURITY

Design and Implementation of 64-bits Advanced Encryption Standard Malik Qasaimeh , Saleem Masaedeh

168

A New Steganographic Technique for Hiding Grayscale Images in Colored-Raw Images Samer Atawneh

175

A New Steganography System Based on a Hybrid Transform Mussawi-Al. Q. Mahmoud , B. A. W. Dr

182

Protection of Cryptographic Implementations using Error Detection Techniques Rodica Tirtea , Mircea Vladutiu

191

Information Security King Saud University Hospitals experience Zahrani-d , Dr Saleh AlImam Mohammad Bin Sau

197

ime NumbersBox Construction Using Arithmetic Modulo Pr-A Real Time S Eltayeb Salih Abuelyman , Mohammed Ahmed El-Affend

207

The Development of Virtual Reality System for Advanced Training Muhammad Shafie Abd Latiff, Imran Ghani , Setyawan Widyarto

217

Network Security Using Chaos and Nonlinear Dynamics Zahid Ali

222

Improved Intrusion Detection/Prevention System Using Fuzzylogic And Data Mining Bharanidharan Shanmugam and Norbik Bashah Idris

228

A Modified Version of the Advanced Encryption Standard Algorithm with Extra Key Size and Block Size Abdurrahman Abdullah Mohammad , Lo’ai Tawalbeh

236

Enhanced Scheme for Group Key Agreement Birahadish, Saravanan. Suresh,P. Poornaselvan , S. J. K

242

Data Base Systems & Applications Data Warehouses & data mining

SIG for the Follow-up and the Management of the Geology Mining Data of the Constantine Region Dr. Mohamed-Khireddine KHOLLADI

254

On Controlling and Prediction of Next Best Sellings through Periodical Mining for {Semi/Non}-interesting Association Rules Asem Omari and Stefan Conrad

271

Data mining based on WaveCluster Yongmin_tang

276

DATA COMMUNICATIONS & NETWORKING

APPLICATION OF NUMERICAL CONTROLLED OSCILLATOR IN DIGITAL RECEIVER USING FPGA Ali Mohammed Hassan

284

Performance Analysis of a Load Distributing Active Anycast RTT-Based Method for Server Selection lail Abd Manan , Jamilin Jais, Mahamod bin Ismail-Habibah binti Hashim , Jamalul

290

quences for FH CDMA systems Hopping seRameshwar Rao. Sudha, FIETE, Dr.L.K

299

thm for mobile networksing algoriAn efficient rout Al Shqeerat, Hassan Mohammed. A. Khalil H

307

New Fast Method for Computing Wavelet Coefficients from 1D up to 3D Walid A. Mahmoud, Hadeel N. Al-Taai, Shereen M. Al-Qasem

313

A novel algorithm for evaluating TCP utilization and modeling TCP reno and tahoe using markovian model in wlan Mohammad mehdi hassani, Reza barangi, ali dorafshan

324

DATA COMMUNICATIONS AND NETWORKING2 zara

Performance Analysis of Multiuser DS-CDMA Linear Receivers under Various Realistic System Specifications Walid. A. Mahmoud, Mansour Abed, Hytham O. Haj Ali, Mahmoud M. Anshas

331

Standard Protocol Using SDR -MA Transmitter for a MultiDigital Design of CD Jamuar, Sabira Khatun. S.Ali, S. Khalid Eltahir Mohamed, Borhanuddin Mohd

340

Speech Synthesis System -To-sed TextConcatenated BaKhalifa. Zakiah Hanim Ahmad, Othman O

347

A Practical Study on Building a Wireless Sensor Network Karaki-Khalil Mustafa Yousef and Jamal Nazzal Al

355

Prosodic knowledge for emotional speech synthesis in Malayalam

Nair,. S, Nimmy Mathew, Achuthsankar S.Gopinath, Sheeba P.Deepa P

362

MT from English to Arabic Handling the Agreement problem in Tengku Mohammed Tenku Sembok, Mohammed Mahmoud Abu Shquier. Prof

370

let Transform The WalidRamahi-Al. Jawher, Nada N-Al. Walid A. Dr. Prof

382

ADAPTIVE TURBO CODED OFDM Sami Ahmed Haider, Khalida Noori

388

DATA COMMUNICATIONS AND NETWORKING nebo

Analytical Model of Grid Location Update Schemes for MANET Khaled Ahmed Abood Omer, D.K. Lobiyal

395

Dominating Set Theory based Semantic Overlay Networks for Efficient and Resilient Content Distribution J. Amutharaj, S. Radhakrishnan

403

New Fast Method for Computing Multiwavelet Coefficients from 1D up to 3D Sallal. Taai, Reema A-Al. Abdulwahab, Hadeel N. Mahmoud, Mutaz S. Walid A

412

A Comparison between Signal Clipping and µ-Law Companding Schemes for the Reduction of Peak-to-Average Power Ratio of OFDM Signals Sulaiman A. Aburakhia, Ehab F. Badran, Darwish A. E. Mohamed

423

Performance modelling of New Congestion Control Mechanism Abdulmonam G. Ali, M.E. Woodward, Mahmud Etbega

432

Middleware Integrated Sensor for Network Energy Utilization: MISNEU protocol Mahmoud Alwan, Ayad Salhieh

438

A LAYERED MIMO OFDM SYSTEM WITH CHANNEL EQUALIZATION Khalida Noori, Sami Ahmed Haider

450

ier, Dovecot, MySQL, Creation of Mail Server Based on Virtual Users and Domains with Postfix, Cour Mailscanner, Spamassassin, Clamav, Postfixadmin and Squirrelmail

Hedaya Alasooly. Dr

455

DATA COMPRESSION

A Modified Compressing Techniques Based On Improved Fast Discrete Fayez Idris, Sameer Bataineh, Ahmed Sawalmeh, Murad Alaqtash

471

A Novel Lossless Data Compression Scheme Based on the Error Correcting Hamming Codes

Bahadili-Hussein Al

478

Bit Level Files Compression Samer Nofal

486

WORD-BASED TEXT COMPRESSION Jan Platoš, Jiří Dvorský

489

E-LEARNING , EDUCATION & ORGANIZATIONS

Recommended Instructional Technology for K-12 Students in Arab Countries Eyas El-Qawasmeh ,Abdallah Tubaishat

496

An Investigation Study Towards Determine Problems, Solutions & Implementation : Learning-E Limitations

i ,Hannan Issa MohsenHawar-Ma'en Al.Dr

501

On Line Course Learning Enhancement Based on Interactive Interface Abdurazzag Ali Aburas and Othman O Khalifa

509

Face and Electronic -to-Face: Productive Qualitative Interviews Choueiri. Rizk ,Elias M. Nouhad J

515

E Learning Vs M Learning in Higher Education D.Balaji, B.Malathi, J.Akbar Ali

532

Modeling and Verification of Community of Practice Using an Actor-based Language Farzad Peyravi, Kaveh Pashaei, Fattaneh Taghiyareh

537

Measurement of E Learning Usability through User Interface Dr.Mudawi Elmusharaf, Abdelrahman Osman Abdelrahman Elfaki, Ahmed Mohammed Elsawi

545

Modern didactic approaches: the case of distant science education in Greece Kalogiannakis Michailsearch\E-LEARNING , EDUCATION & ORGANIZATIONS\p71.doc

550

An Overview on Electronic Institutions Farnaz Derakhshan

557

Knowledge Management and Intellectual Capital at the University Environment Dr. Issa Shehabat, Dr. Saad A._Mahdi, Dr. Kamel Khoualdi

569

E-TECHNOLOGIES & THE WEB

Legal Web Accessibility Natheer Gharaybih

576

E-commerce: Security Enhancement In Internet Banking Dr. Abeer H. Rasheed Al-Sadoon, Miss. Abeer T. Maolood Al-Obaidy

585

inesss Used Books Bus’Platform for a Faculty-E Muhaini Othman, Salimah Mokhtar

591

Mobile-Commerce vs. Internet-Commerce for New Business Opportunities Ahmad Hayajneh, Hamid Mehrvar

601

A Web Audio System Based on Object Deputy Database Fan Liu, Yuan Cheng, Zhiyong Peng

609

e Arab Countries in AfricaAn Analysis of th: Government Service Delivery Capabilities-E & the Middle East Akemi Takeoka Chatfield, Omar Alhujran

615

Quality in Web Interface Input XML Message Generation and Communication Tor Stålhane

625

Improving Web Search Results for Short Queries Using Preserved Query Knowledge Roberto Solis-Oba and Anwar Alhenshiri

634

E-TECHNOLOGIES & THE WEB2

LUP: Least and Unique Price Auction-A New Type of Online Auctions Dr. Mohammed A. Otair

650

ContentRank: a New Content-based Page Ranking Hui Li, Shu Zhang, Xia Wang, Nian Shao

607

An Used O-O-M to Support Web Site Design Hadeel S. Kareem, Abeer Salim Jamil

614

E-Commerce Contract Modeling and the Contract Law Radomir A. Mihajlovic, Michael J. Gregorek, Ayat Jafari, Darko V. Mihajlovic

621

Evolutionary Improving World Wide Web Queries Václav Snášel, Pavel Krömer, Suhail S. J. Owais, H. O. Nyongesa, S. Maleki-dizaji

630

Web Patterns and Web Page Semantics Milos Kudelka, Vaclav Snasel, Ondrej Lehecka, Eyas El-Qawasmeh

641

Guidelines for Constructing Web Engineering Process Models for Developing Based Applications-Scale Web- Large

Omaima Nazar Ahmad AL-Allaf, Asim El-Sheikh

651

pport ASP Using Two MethodsConfiguration of Apache Server to Su Hedaya Alasooly. Dr

667

IMAGE PROCESSING

elet Image Segmentation Applied on Medical Images using Wav Faraheed-ltanny, Mohammad AlAlsu. Yas A

688

Facial Features Extraction Image Segmentation Using HIS Color Applied on Hameed. Stephan, Sundos A. Jane J. Dr

695

entification and Labelingbrid Transformation Based Automatic Image IdHy Ramahi-Al. Ani, Nada N-Al.Laith A. Jawher, Dr-Al. Walid A. Dr. Prof

704

n and Neural NetworknsformatioImage Identification and Labeling using Hybrid Tra Ramahi-Al. Mikhled Alfaouri, Nada N. Jawherand, Dr-Al. Walid A. Dr. Prof

718

Kobasi,-Mahmoud, Sarwa Al. Walid A. Dr Using Walidlet TransformA Proposed Method of Image ReconstructionSakhrie. Mohammad H. Eng

738

ation of Cervical Smear ImageCytoplast and Nucleus Segment 1Chieh Chen-, and Chun1Hong Lin-, Chi2Kuan Chan-, Yung1Horng Lin-Chuen

742

Descriptor Color Clustering and Spatial Relationthe Fast Image Retrieval Based on Chuen-Horng Lin1, Yung-Kuan Chan2, and Kai-Hung Chen1

748

iDTV Player Compatible MPEG4 and MHP Content Momouh Khadraoui (1), Oliver Tjulin (1), Beat Hirsbrunne (1) and Djamel Khadraoui (2) (1): PAI Group

754

IMAGE PROCESSING 2

GE GENERATION AND COLORIZATIONLUMINANCE PYRAMID FOR IMA Bara'a Ali Attea, Mariam A. Ali

763

A Steganographic Approach Based on Spatial Frequency Layering Sarab Majeed Hameed. Dr

771

A NON Reference Fingerprint Image Validity via Statistical Weight Calculation M.S. ALTARAWNEH, L.C.KHOR, W.L.WOO and S.S DLAY

776

using Moments on shapeIMAGE RETRIEVAL Wesam Atef Hatamleh, Rosalina Abdul Salam

780

Color Difference VQ Compression and Data Hiding Ting Chan-Hsiu** Mao-Fan Yang-, and Shys**Yuan Tsai-Tsang, *Husiun Tsai-, Meng*Kuan Chan-Yung

787

Self Embedding Robust Watermarking in Discrete Wavelet Transform Domain for Digital Colored Images Abdallah Al-Tahan Al-Nu'aimi, Rami Qahwaji

800

Direction Relations in Spatial Queries Using MBC Maytham Safar

807

INFORMATION SYSTEMS

A Light Weight Stemmer for Bengali and Its Use in Spelling Checker Md. Zahurul Islam ,Md. Nizam Uddin, Mumit Khan

SIG for the Survey of the Evolution of the Distribution of the Population of the Adrar Region Dr. Mohamed-Khireddine KHOLLADI

817

Arabic vowels recognition systemType written Majdi Salameh. Nazlia Omar, Mr. Khairuddin Omar, Dr. Dr

826

A study of Arabic SMS-based classified ads SUBlanguageS DAOUD DAOUD , CHRISTIAN BOITET

835

A User Centered Matchmaking and Ranking System . Ahmad Rawashdeh, Rehab Duwairi

845

Text To Speech for Bangla Language using Festiva Firoj Alam ,Promila Kanti Nath , Dr. Mumit Khan

853

Improving Cluster-Based Malay Text Retrieval System Using Thesaurus

Nurazzah Abd Rahman, Zainab Abu Bakar, Normaly Kamal Ismail , Tengku Mohd Tengku Sembok

860

A Knowledge-Base on Holy Qur’an for Tagging Arabic Verbs Mahmoud Shokrollahi-Far , Ayaz Isazadeh , Isa Barzegar, Rezgar Soltani

869

ota and Schedule Backup Configuration of a Simple Samba File Server, Qu Dr. Hedaya Alasooly

876

A Light Weight Stemmer for Bengali and Its Use in Spelling Checker Md. Zahurul Islam , Md. Nizam Uddin , Mumit Khan

887

INFORMATION SYSTEMS2

Involving cognitive science views on collections to better design our Content management tools Francis Rousseaux , Alain Bonardi

888

Segmentation free Bangla OCR using HMM: Training and Recognition Md. Abul Hasnat , S. M. Murtoza Habib , Mumit Khan

894

Deploying and Aligning Organizational Strategy Using Intranet Based Knowledge Management System Norlida Buniyamin, Zainuddin Mohamad

902

An Agent Mediated Community of Practice Using MAS-CommonKADS Methodology

Farzad Peyravi , Fattaneh Taghiyareh

912

Developing business functions in today’s digital environment Dr Mohamad AlSakka

921

Optimization in in IR System Using GP and Fuzzy Grow Up Precision Recall Relationship Curve QueryOptimizing the User

Suhail Sami Owais , Pavel Kromer , Vaclav Snasel

939

Performance Analysis of Information Retrieval Systems Based on Genetic Algorithms Ibrahim Zedan , Mohamed Nour , Sanaa Abo-Elhamayed

949

A Light Weight Stemmer for Bengali and Its Use in Spelling Checker Md. Zahurul Islam , Md. Nizam Uddin , Mumit Khan

962

INFORMATION SYSTEMS & APPLICATIONS – NEBO

Selecting an Architectural Style Satisfying A banking Organization Requirements Using Simulation Yousef Hasan Jbara , Hussam Al-shorman

963

Autonomic Computing : A Survey M. Al-Zawi , D. Al-Jumeily , A. Hussain , A. Symons , A. Taleb-Bendiab

973

TOWARDS AUTOMATIC TRANSFORMATION FROM COSA SOFTWARE ARCHITECTURE TO CORBA PLATFORM Adel Alti , Tahar Khammaci and Adel Smeda

980

Bus Information, Scheduling, and Control for Amman (Project BiSCA) Ehab Al-Hakawati , Fayez Al-Rafia , Khalid Al-Tahat , Nasim Al-Tamimi

990

Malay Spelling Exchange Rule: A Computational Technique in Information Retrieval for Identification Similar Words in Historical Malay Text Zainab Abu Bakar , Tengku Mohd. Tengku Sembok , Mohammed Yusoff

1003

Arabic Stemming Based on affixes Removal Mohammad Khaleel Qasem , Sari Awwad

1015

Comparison of Information Retrieval Models for Arabic Text Muath Alzghool and Diana Inkpen , Ghassan Kanaan

1023

A New Paradigm of Pervasive Information Systems Dana Amin Al-Kukhun, Florence Sedes

1033

NEURAL NETWORKS AND ARTIFICIAL INTELLIGENCE

Automatic Estimation of Maximum Frequency and Velocity of Liquid Simulating Blood M.D Kedir-Talha , Mohamed Mehenni

1043

uzzy linear regression analysis of job satisfaction of Taiwan college graduates A f Lu Chyu-Chiang Kao and Chin

1051

Damped Vibration Analysis of Extrinsic Fabry-Perot Interferometric Sensors using Artificial Neural Networks Rohit Dua , Ayat Jafari

1058

Review on the Development and Utilization of Artificial Neural Networks Applied to ECG Signals Diagnosis Salama Meghriche , Mohammed Boulemden

1066

An Improved Odor Recognition System Using Learning Vector Quantization with a New Discriminant Analysis Turgay Temel, Bekir Karlik

1075

PARALLEL COMPUTING & DISTRIBUTED COMPUTING

Data base Distribution in Telemedicine Alsultanny , Zeyad Nasro. Yas A

1081

OptorSim SimulatorA Management Protocol of Replications in the

Ghalem Belalem

1090

Architecture of Multi-Agent System for Distributed Systems Prof. Dr. Hilal M. Yousif , Ass. Prof. Dr. Jane J. Stephan , Dr. Ghossoon M.W. Al_Sadoon

1098

Intelligent Agent System for Accessing Remote Energy Meters Padmin.and T. Sankaranarayanan.E.Suriyakala ,P.D.Ci

1104

Multi Installment Scheduling and Allocation of Divisible Jobs on Single Level Tree Networks with Buffering Limitation Sameer M. Bataineh , Abdullah M. Audat

1111

Grid Environment for Password Recovery Jadallah , Amjad Abu Jbara. Dina S

1119

Parallel Implementation of the Finite Difference Time Domain Method Using the Message Passing Interface Omar Ramadan , Oyku Akaydin

1127

Bayesian Student Modeling in a Distributed Environment Yaser Nouh, Indumathy.R, Karthikeyani.P, Varunkumar Nagarajan, and R. Nadarajan

1132

A Model for the Estimation of Buffer Requirement in Distributed Networks Saleh A. Khawatreh , Khalid Khanfar

1141

SOFTWARE ENGINEERING

sionalism and ResponsibilitiesCode of Ethics, Profes

Khader Muspah Titi

1146

Case Study of: Evaluating the Role of Concerned Parties in Media Awareness against Software PiracyJordan

Sheikh , Abdullah Rashed , Rawan Nassri Abulail , Moh`d Abdallah Ali Shkoukani , Bashar Alqudah-Asim El

1156

Assessment of System Development Models with Regard to Software Reuse Practice

Adnan Rawashdeh

1164

Identifying Representatives for Interfering Automata Viliam Holub

1178

s Failure ’box Component-kDetermining the Blac

Ibrahim Hilal , Aman Jantan 1186

) UML(Perceptions of the Unified Modeling Language ’ Users Jafar Ali , Bassam Hasan

1190

How quality assured by Extreme How quality assured Exterme Programming (XP )? Sana'a j. Khalaf

1198

Managing Inconsistency in Software Requirements A Systematic Approach for

Randa Ali Numan Khaldi , Dr. Saleh Abu-Soud

1204

Requirement Modeling -Using Ontology to Support Software Development ProcessNisreen Innab , Ahmad Kayed

1216

WIRELESS COMPUTING

Designing and Modeling MEMS Filter for Front-End Wireless Transceivers

Mustafa S. Al_Khusheiny , Burhanuddin Y. Majlis

1223

WEB PERSONALIZATION FOR MOBILE DEVICES Akbar Ali , Ruwi. Malathi , J.Balaji , B.D

1231

Basic notions, energy consumption and MAC protocol layer: Wireless Sensor Networks Ahmed LOUAZANI , Bouabdellah KECHAR , Mohamed Faycal KHELFI

1236

WLAN Based on Location FingerprintingDecision Tree Approach to Estimate User Location in

Osama Mohamed Badawy , Moustafa Ahmed Bani Hasan

1247

An Analytical Model for Short-Lived TCP Flows in Heterogeneous Wireless Networks Sameer Bataineh , Jamal Al-Karaki , Haya Sammaneh

1256

Time Scheduling in Hybrid Wireless Links -Using Link Diversity for RealLiliana Grigoriu

1275

Position Location in Wireless Networks Zahid Ali

1284

Weighted Angular Distance Based Cache Replacement Strategy for Location-Dependent Data in Wireless Environment Mary Magdalene Jane. F, Parameswaran.R, Raghavendra Prasad.R, R.Nadarajan

1290

WIRELESS NETWORKS

Dependable and Secure Data Storage and Retrieval in Ad-Hoc Networks Ali Barati , Ali Movaghar

1299

Development and Performance Analysis of a Probabilistic Flooding in Noisy Mobile Ad Hoc Networks Bahadili , Yousef Jaradat-Hussein Al

1306

World Implementation -rotocol under theRealVector P-Distance-Demand-on-Hoc-Performance of the Ad Yusnani Mohd Yussoff , Habibah Hashim , Mohd Dani Baba

1317

ique for Mobile Adhoc NetworksAn Effective Terminode Routing Techn Balamurugan , Jameer Basha

1327

AND CORRECTION TECHNIQUES USEDAN INVESTIGATION OF ERROR DETECTION IN WIRELESS TRANSMISSION

VIJESH. JAGADEESH KUMAR , K. K.J.S

1336

An Addressing Scheme for Routing and Power Saving in MANET Arwa Zabian

1343

Network ) PRMA(Network and Wireless ) Token Ring(Throughput and Delay Analysis of Integrated Wired Amaal Al_Amawi

1352

١٨٢

A New Steganography System Based on a Hybrid Transform

Dr. W. A. Mahmoud University of Al-Isra, Jordan [email protected]

B. Q. Al-Mussawi

University of Kufa, Iraq [email protected]

ABSTRACT In this paper a secret-key Steganographic system will be illustrated which embeds four

gray-scale secret images of size ( 128128 × ) pixels into a cover image of size ( 512512 × ) pixels. The techniques used in this project to analyze the cover into its frequency components are a Wavelet transform and a new transform that is called Hybrid transform. Hybrid transform overcomes the weakness of Wavelet in higher dimensions; with this transform we own Orthonormality. The Hybrid transform is itself invert- the inverse transform use the same algorithm as the forward transform.

Combinations of Steganography and cryptography have been made in this work to increase the level of security and to make the system more complex to be defeated by attackers.

By both objective and subjective observations, the resultant stego-image that will be transmitted did not draw any suspicion, so the main goal of Steganography is performed. The proposed system can easily be applied by any end user who can provide the system with his key and both the embedded and the cover images, and to get the stego-image. The results obtained from Hybrid transform are better than obtained in Wavelet transform.

The proposed system was built by using (Matlab version 6.5) and run on Pentium-4 computer.

Key words: Fourier Transform, Wavelet Transform, Hybrid Transform, Steganography, Cryptography. 1. Introduction. Steganography is the art and science of hiding. Steganography system is embedding hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion [2][3]. In this paper, the proposed security system is composed of two stages (Cryptography and Steganography) to hide up four grayscale images of size )128128( × pixels inside a grayscale covered-image of size

)523523( × pixels in case of Hybrid transform and )512512( × in case of Wavelet transform. Thus in addition to Steganography, the secret images should be first encrypted to provide additional level of protection.

The cryptographic stage is composed of three sub-stages for the purpose of forming the scrambled image before embedding data into the cover image. These sub-stages are the transposition ciphering and stream ciphering and then transposition ciphering [4][5]. Hybrid transform consists of four stages namely 2-D Fourier transform, data arrangement, 1-D inverse Fourier transform and then Wavelet transform. In Hybrid transform the advantages of Fourier transform and Wavelet transform are obtained where the line discontinuities are represented as lines instead of points. This ability gives the system better representation for line discontinuities than Wavelet transform does.

١٨٣

2. Transforms Technique 2.1 Fourier Transform In 19th century, the French mathematician, J. Fourier, showed that periodic function can be expressed as an infinite sum of periodic complex exponential functions. Many years after this remarkable property of periodic functions was discovered. The ideas were generalized to non-periodic functions, and then to periodic or non-periodic discrete time signals. After this, Fourier transform became a very famous tool for computer calculations. The equation

is generally called the Fourier Transform, while the equation

is called the inverse Fourier Transform. Note that in the Fourier Transform equation, the integration is from minus infinity to plus infinity over time. So, no matter when the component with frequency ω appears in time, it will effect the result of the integration equally as well [2][3].For many signals, Fourier analysis is extremely useful because the signal’s frequency content is of great importance. So, why do we need other techniques, like wavelet analysis are needed? Fourier analysis has a serious drawback. In transforming to the frequency domain, time information is lost. When looking at a Fourier transform of a signal, it is impossible to tell when a particular event took place [4].

In an effort to correct this deficiency, Dennis Gabor (1946) adapted the Fourier transform to analyze only a small section of the signal at a time-a technique called windowing the signal. Gabor’s adaptation, called the Short-Time Fourier Transform (STFT), maps a signal into a two-dimensional function of time and frequency [4]. The basic idea is to divide the signal into small enough segments, where these segments can be assumed to be stationary. The width of this window must be equal to

the segment of the signal where this assumption is valid. The Windowed Fourier Transform has several problems. If we use a window of infinite length is used, the Fourier Transform, which gives perfect frequency resolution, but no time information will be obtained. On the other hand, in order to obtain a stationary sample, we must have a small enough window in which the signal is stationary. The narrower we make the window, the better the time resolution, and better the assumption of stationary, but poorer the frequency resolution. However, the Wavelet transform solves the dilemma of resolution to a certain extent, as will be described in the next part [3].

2.2 Wavelet Transform The fundamental idea behind wavelets is to analyze the signal at different scales or resolutions, which is called multiresolution. Wavelets are a class of functions used to localize a given signal in both space and scaling domains. A family of wavelets can be constructed from a mother wavelet. Compared to Windowed Fourier analysis, a mother wavelet is stretched or compressed to change the size of the window. In this way, big wavelets give an approximate image of the signal, while smaller and smaller wavelets zoom in on details [5]. Therefore, wavelets automatically adapt to both the high-frequency and the low-frequency components of a signal by different sizes of windows. Any small change in the wavelet representation produces a correspondingly small change in the original signal, which means local mistakes will not influence the entire transform. The wavelet transform is suited for non-stationary signals, such as very brief signals and signals with interesting components at different scales [4][6], figure (1) illustrates the comparison between the output of wavelet transform and other transforms.

dte)t(f)w(F jwt−∞

∞−∫= ………. (1)

dwe)w(F21)t(f jwt∫

∞−

..……. (2)

١٨٤

2.3 The Proposed Hybrid Transform Hybrid transformation is proposed here combining four stages namely: the 2-D Fourier transform, Data arrangement, the 1-D inverse Fourier transform and the1-D wavelet transform. The following procedure shows the computation steps that are used in this hybrid transform: Step 1:

The size of the input data should be square and prime number. Here, a size of

)523523( × pixels is used; this size is selected experimentally after several tests. Note that this transformation will be applied only to the cover image.

To simplify this procedure in detail the image X will be considered of size )77( × as an input to this transformation.

X =

0000000000000000111000011100001110000000000000000

………. (3)

Step 2: The 2-D Fourier transform (F) to the input image data X is calculated. Hence F will be equal to:

−+−+−−−−++−

+−−−−−+++−−+−−−−+−+−−−−+−+−+−−+

−−−−+−+−−−+−+−+−−−−+−−+−−−++−−

94.314.321.127.075.140.040.112.154.012.100.004.592.207.621.127.030.006.034.027.0193.040.000.030.054.012.130.12.1

75.140.030.027.027.057.000.064.019340.054.012.134.253.040.112.119.040.000.064.027.057.034.027.075.140.034.253.054.012.100.030.019.040.034.027.030.006.021.1277.03.103.100.0048.554.012.140.112.175.140.021.127.094.314.392.207.692.207.630.104.134.253.075.253.030.104.192.207.600.9

iiiiiiiiiiiiii

iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

……………………… (4) Before applying data arrangement, the dc component will be saved and replaced by zero so that the reconstruction process can be more resistant against noise.

m = F(1,1) / p ………………. (5) F(1,1) = 0 ………………….. (6)

−+−+−−−−++−+−−−−−+++−−

+−−−−+−+−−−−+−+−+−−+−−−−+−+−−−+−+−+−−−−+−−+−−−++−−

94.3i14.321.1i27.075.1i40.040.1i12.154.0i12.100.0i04.592.2i07.621.1i27.030.0i06.034.0i27.0193.0i40.000.0i30.054.0i12.130.1i2.1

75.1i40.030.027.027.0i57.000.0i64.0193i40.054.0i12.134.2i53.040.1i12.119.0i40.000.0i64.027.0i57.034.0i27.075.1i40.034.2i53.054.0i12.100.0i30.019.0i40.034.0i27.030.0i06.021.1i277.03.1i03.100.0i048.554.0i12.140.1i12.175.1i40.021.1i27.094.3i14.392.2i07.692.2i07.630.1i04.134.2i53.075.2i53.030.1i04.192.2i07.600.0

…………….….. (7) Step 3: In this step, the data arrangement will be performed. The important point that should be taken into account is the size of the input image which must be a prime number and a square matrix. The benefit from this arrangement is to transform from Cartesian coordinate to polar coordinate. For the 77 × matrix, a

Figure (1) Comparison between wavelet output transform and others output transform

١٨٥

matrix of (K,L) dimension that belong to slices without including the point (0,0) is constructed as given below, p=7 (where p represent the number of rows or columns).

K =

−−−

321123

……………….. (8)

Where K represent the transpose of the value of [-p2 :-1,1:p2], where p2 represent the floor of (p/2). Next, the following modification should be followed to achieve this arrangement:

[1] Add horizontal and vertical slices later. m=1 2 3 4 5 6

G = K(:,ones(1:p-1)) …...……… (9)

G =

−−−−−−−−−−−−−−−−−−

333333222222111111111111222222333333

…….... (10)

[2] Centralize L mod P by employing the

matrix notation L & P matrices of the form :

L =

−−−−−−−−−

−−−−−−−−−−−−

312213231132321321654321231132312213

…….... (11) ……………...… (11)

Then, put it in polar coordinate:

P =

−+−+−+−++−−+−−−++++−+−+−−−−−−−+−−−−−+−+−−−+−−−+−−−+−−−

iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

331323231333223212123222112131312111112131312111223212123222331323231333

. .……….(12) Where each real value in matrix P represents its corresponding value of matrix G and each imaginary value in matrix P represent its corresponding value of matrix L.

[3] Compute the angles of all these elements of the matrix in radian and consider all positive angles and replace the negative angles by NaN.

D =

NaNNaNNaNNaNNaNNaNNaNNaNNaN

NaNNaNNaNNaNNaNNaNNaNNaNNaN

333322

321123223333

….…(13)

[4] In case of equal D favor min ABS(P) and min ABS(G), then[ ] ( ) ( )kabsepsilon)p(absepsilonDminI,Y 2 ×+×+= where epsilon= e -6

Y = [ ]122221 I = [ ]335244 ..….. (14)

[ ]2p:0J −= ................ (15) [5] Retrieve these points and put them in a

set of directions

( )( ) ( )( )[ ]J1pIL;JpIKM ×−+×+= ...(16) M =

[ ]112211 −−− [ ]121121 ………… (17)

[6] Add horizontal and vertical slices. M = [ ]01112211 −−− [ ]10121121 . ………. .. (18)

[7] Sort out these directions in ascending order of angles and the result will be as follows: Y = [0 0.46365 0.7854 1.1071 1.5708 2.0344 . 2.3562 2.6779] I = [7 4 1 2 8 5 6 3 ] ……………… (19)

M =

−−−1121211021101121

………….. (20) Step 4: Computing Fourier slices these are represented by (K , L) Where

( )( )p,:,1MtmodK ×= ....…… (21)

( )( )p,:,2MtmodL ×= ……... (22) And [ ]1p,0t −= ........ (23)

١٨٦

K =

21106656422055356330441414403363355022425660112100000000

…………(24) ……..….... (24)

L =

66565660553535504414144033636330224242201121211000000000

………... (25)

t =

6543210

............ (26)

Where the instruction mod return the output of mod (x,y) as follows : If the sign of x & y is similar then it returns ynx ×− where n =floor(x,y). If the sign between them is different then it returns rem(-x,y)+y. After these computations one can find the projection of Fourier transform

( )Lpkfxfy ×++= 1 ………….. (27)

fy=

−−

−−+−+−

+−

−+−+−+−−+−+−

−+−−+−−+−−−−+−−−+−−+++−−+−−−++−−+−+−−+

+−−−−−−+−−−−

54.012.134.027.0

75.140.075.140.034.027.054.012.1

00.0

00.004.554.012.192.207.621.127.094.314.321.127.092.207.600.030.034.027.03.103.119.040.030.006.019.040.030.103.100.064.075.140.034.253.040.112.127.057.040.112.134.253.000.064.075.140.034.253.040.112.127.057.040.112.134.253.000.030.034.027.030.103.119.040.030.006.0193.040.030.103.100.004.554.012.192.207.621.1277.094.314.321.1277.092.207.6

00.000.000.000.000.000.000.0

iiiii

iiiiiiiiiiiiiiiiiiiii

iiiiiiiiiiiiiiiiiiiii

. .………… (28)

Step 5: Take the 1-D inverse Fourier transform for the output of the step 3. y real ( inverse Fourier transform for yf ) yf =

−−−−−−−−−−−−

−−−−−−−−−−−−−−−−−−−−−−−−−

28.071.028.028.128.071.128.028.171.028.028.028.128.071.028.028.128.028.171.071.128.028.028.071.171.028.128.071.171.028.171.071.128.028.071.071.128.028.128.071.128.071.028.028.171.028.071.028.128.071.128.028.128.071.028.028.1

… (29)

after taking the 1-D inverse Fourier transform one makes normalization to the output of the inverse Fourier and as follows:

pyy /= =

−−−−−−−−−−−−

−−−−−−−−

−−−−−−−−−−−−−−−−

10.027.010.048.010.164.010.048.027.010.010.048.010.027.010.048.010.048.010.164.010.010.110.064.0

27.048.010.064.027.048.027.064.010.010.027.064.010.048.010.064.018.027.018.048.027.010.027.048.018.064.010.048.018.027.010.048.0

…..(30)

Step 6: Before applying 1-D Wavelet transform a row of zeros must be added to the output of step 4 to satisfy the condition of the input image matrix; then the input image matrix of wavelet transform will equal to:

X =

−−−−−−−−−−−−

−−−−−−−−

−−−−−−−−−−−−−−−−

00.000.000.000.000.000.000.000.010.027.010.048.010.164.010.048.0

27.010.010.048.010.027.010.048.010.048.010.164.010.010.110.064.0

27.048.010.064.027.048.027.064.010.010.027.064.010.048.010.064.018.027.018.048.027.010.027.048.018.064.010.048.018.027.010.048.0

..(31)

After adding the row of zeros, the following procedure is applied:

1- For an 88× matrix input 2-D signal, construct a D4 transformation matrix, W.

W=

−−

−−

−−

−−

230000311000002131230000

3210000000312300003210000000312300003210

CCCCCCCCCCCC

CCCCCCCC

CCCCCCCC

CCCC ........(32)

Where C0= ( ) 24/31+ , C1= ( ) 24/33 + ,C2= ( ) 24/33 − and C3= ( ) 24/31− . 2- Apply row transformation as follows:

i) Z=W*A; Z=

−−−−−−−−−−−−−−−−−−

−−−−−−−−

−−−−−−−−−−−−

09.054.009.040.004.012.004.040.006.024.006.028.011.038.011.028.013.031.010.038.005.049.005.038.0

14.023.001.020.016.031.016.020.010.029.020.025.015.011.015.025.0

11.055.011.006.116.070.016.006.101.029.025.079.010.048.010.079.020.057.006.057.011.000.011.057.0

..... (33)

ii) permute [Z] to get P

P=

−−−−−−−−−−−−−−−−−−−−−−−−−−−

−−−−−−−

−−−−−

09.054.009.040.004.012.004.040.013.031.010.038.005.049.005.038.010.029.020.025.015.011.015.025.001.029.025.079.010.048.010.079.006.024.006.028.011.038.011.028.0

14.023.001.020.016.031.016.020.011.055.011.006.116.070.016.006.120.057.006.057.011.000.011.057.0

. ........ (34)

١٨٧

3. Conversion of the Hybrid Transform as a Vector At this stage the output of the Hybrid transform will be arranged as a vector. Here only 65536 pixels from 273529 pixels are selected; this vector is arranged in matrix of size 102464 × . Next, the coefficients are coded to 24 bit. The secret message will be embedded in these formed coefficient matrix of 102464 × following certain rules. 4. Encryption Process The four secret images of size )128128( × pixel are encrypted in such a way to form one encrypted image of size )256256( × pixel. The resultant image encompasses all secret images but in scrambled form. The encryption that has been taken in this thesis is composed of three stages: transposition ciphering, stream ciphering and transposition ciphering. 4.1 Transposition Ciphering: First, each secret image is divided into blocks usually of fixed size. The proposed system suppose that each secret image

system suppose that each secret image will be divided into a set of blocks of size

)44( × pixel, then sequentially reordering the blocks in a manner to form a vector.

After one gets four vectors corresponding to four secret images, the first ciphered image will be created by transposition. This can be achieved by taking the first block of each vector to form the first super block of the ciphered image, and so on. The size of super block is )88( × pixel. Since the four original secret images are of size )128128( × pixel each, then the first ciphered image will be of size )256256( × pixel. Applying the transposition ciphering to the four secret images will mix the properties of all images; therefore it is so difficult to recognize them.

4.2 Stream Ciphering: Stream ciphering is the second level of ciphering technique. The stage of stream ciphering is applied to the final resultant image from the transposition cipher. Eight pixels are taken from this image and then each pixel is converted into 8-bits. Since the image is a gray scale of 256 -level then the 8-bits is sufficient for all image. After this conversion, the result is arranged to form a matrix. This matrix is of size

)88( × bits because there are 8-pixels and they are converted into 8-bits, hence there are 64 -bits. The stage of stream ciphering is applied to this matrix by scrambling the streams of bits. The scrambling is made by taking the last column of this matrix as the first row in the scrambled matrix and so on. This means that each row in the scrambled matrix represents the new pixel after it is converted into decimal mode. This new pixel has one bit from each original 8 pixels. In other words, each time 8 pixels are taken from the image and converted into binary mode. This result will be translated into matrix form of 8 pixels. Each row in this matrix represents one pixel from the 8 pixels. The scrambling is converting the columns-starting from the last one as the first row into the new matrix and so on. Each row in the scrambled matrix is translated into decimal mode to form the new 8 pixels into the stream ciphered image. This process is done on the whole size of transposition-ciphered image. At this point, the stage of stream ciphering is completed. 4.3 Transposition Ciphering: This stage is to make the security system more robust and secure. This additional stage redistributes the pixels of stream-ciphered image according to a secret algorithm. The above algorithm divides the stream-ciphered image into four blocks of equal size. As the stream ciphered image is of size )256256( × pixels then the blocks will be of size )128128( × pixels each.

١٨٨

Figure (2) Algorithm used for final ciphered image. A- Stream-Ciphered Image. B- Final-Ciphered Image The first pixel in block 1 and the corresponding pixels in the other blocks are combined to form matrix of size

)22( × pixels. This matrix is the first block of the final ciphered image. Doing this operation to the whole pixels of the stream ciphered image we will get the final ciphered image. Figure (3) shows typical encryption process.

5. Embedding Process After getting the final ciphered image, the cryptography technique has been completed; after that, the embedding process will be started. The coefficients obtained in the Hybrid transform are randomly selected from the vector of Hybrid transform according to a pseudorandom [7], which is named

)1PN( .Therefore, if 5)I(PN = , then coefficient number 5 will be used as a host to the 8-bits from the final ciphered image. Each element in the vectors consists of 24 bits; the 24th bit represents the sign of the related coefficient while the 1st bit represents the most significant bit )MSB( of the coefficient. The embedding process will place the 8- bits of final ciphered image instead of 8- bits from the 23 bits of the coefficient; the selection of which 8-bits will be taken from the 23 bits depends on another pseudorandom named )2PN( . By experiment, four best locations could

be used to embed secret message; these locations are taken between (bit 12-19, bit 13-20, bit 14-21, and bit15-22). So, according the PN2, which has four decimal values, the location where the 8-bit will be embedded can be identified. Keeping on this process till all bits of final ciphered image are completely embedded in the coefficients.

6. The Proposed Steganography System for Recipient The recipient will certainly get the stego-objcet. But he could not extract the secret information out of the cover without knowledge of which keys )2PN&1PN( have been used in the embedding process.

88878685848382817877767574737271686766656463626158575655545352514847464544434241383736353433323128272625242322211817161514131211

AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

(A)

88848783868285814844474346424541787477737672757138343733363235316864676366626561282427232622252158545753565255511814171316121511

AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

(B)

Secret image 1

Secret image 3

Secret image2

Secret image 4

First-ciphered image

50 100 150 200 250

50

100

150

200

250

Stream-ciphered

Final-ciphered

50 100 150 200 250

50

100

150

200

250

Figure (2) typical encryption process

١٨٩

The recipient also should know the manner used in the encryption process. For hybrid based stego, when the requirements are present then the extracting process will be started. This can be done by handling the stego-object by hybrid decomposition using the same procedure that is used in the proposed Steganography system for sender, the coefficients results are rearranged in a manner similar to that in the sender. Using the same 1PN and 2PN used in the sender to select the coefficients where the data has been embedded and to extract the bits of the final ciphered image. By taking the inverse of the ways used in encryption process, the four secret images are perfectly reconstructed. 7. Conclusions The proposed system can be defined as a secret key Steganographic system where the same key has been used by the sender and recipient. The images which contain sharp edges or more high frequency component (more details) can better be used in the embedding process. The result which is obtained in Hybrid transform is more stability against noise than Wavelet transform, table (1) shows values of PSNR and correlation test for some types of image format for Wavelet transform and Hybrid transform. Table (1) values of PSNR and correlation test for some types of image format for Wavelet transform and Hybrid transform.

Figure(4) shows original cover image and it's corresponding stego-image in Wavlet transform case and in Hybrid transform case.

References [1] N., Johnson, Z., Duric and S., Jajodia, "Information Hiding Steganography and Watermarking Attacks and Countermeasures", Kluwer Academic Publisher, 2001. [2] G., Chen, "Applications of Wavelet Transform in Pattern recognition and De-noising", M.Sc. thesis, Concordia University,1999. [3] P., Xiao, "Image Compression by Wavelet Transform", M.Sc. thesis, East Tennessee State University, 2001.

[4] M. Misiti, Y. Misiti and J. Poggi, "Wavelet Toolbox for use with MATLAB", MATLAB version 6.5. [5] F., A., Sabir, "Evaluation of Information Hiding For Still Image", M.Sc. thesis, University of Technology, Electrical Dept., 2004. [6] Jacob T. Jackson, Gregg H. Gunsch, Roger L. Claypoole, Jr., Gary B. Lamont, "Blind Steganography Detection Using a Computational Immune System", International Journal of Digital Evidence, Vol. 4, Issue 1, pp.1-19, Winter, 2003.

Image type and name Transform Type

01.BMP 02.JPG 03.TIF

Wavelet transform

PSNR =47.7010

correlation =0.9999

PSNR =47.5405

correlation =0.9999

PSNR =47.5450

correlation =0.9999

Hybrid transform

PSNR =52.2401

correlation =0.9999

PSNR =52.4401

correlation =0.9999

PSNR =52.0451

correlation =0.9999

Stego-image using wavelet transform

Stego-image using Hybrid transform

Original cover

Figure (3) Original cover image with it's corresponding stego-image in Wavelet transform case and in Hybrid transform case

١٩٠

[7] W. Chen and C. Chen, "Multi-Resolution Structure Color Image Compression Using DWT and VQ", Dept. of Electrical Engineering, National Cheng Kung University Tainan,70101, Taiwan, R.O.C. [8] S. Areepongsa, Y. F. Syed, N. Kaewkamnerd and K. R. Rao, "Steganography for Low Bit Rate Wavelet Baesd Image Coder in Image Retrieval System", explre2, pp. 1-6, 2000.

[9] K., Gulati, "Information Hiding Using Fractal Encoding", M.Sc. thesis, School of Information Technology, Indian Institute of Technology Bombay, 2003.