Authentication of data hiding using co-occurrence matrix

Section: Research Paper
Published
Jun 25, 2025
Pages
67-78

Abstract

This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying the authenticity and credibility of the received message. The research designs and implements proposed system for verifying the authenticity of retrieved information which are ciphered and hidden inside colored images. This is done through utilizing the capabilities and features that the process of image texture analysis offers, using the co-occurrence matrix. The message authenticity is verified by comparing the co-occurrence matrices before sending and after receiving in order to assure non infiltration.
Results of applying this system on image files with different extensions, and on text messages with different sizes too, have shown supremacy in fighting spam.

Identifiers

Download this PDF file

Statistics

How to Cite

jader saeed, M., میلاد, thanoon, G., & غادة. (2025). Authentication of data hiding using co-occurrence matrix. AL-Rafidain Journal of Computer Sciences and Mathematics, 9(1), 67–78. Retrieved from https://rjps.uomosul.edu.iq/index.php/csmj/article/view/19681