Papers by Reham A. El-Shahed

Bulletin of Electrical Engineering and Informatics
Internet simplified digital data transferring. This data needs to be secured; so securing digital... more Internet simplified digital data transferring. This data needs to be secured; so securing digital data becomes an important concern. Steganography provides security for data by inserting it into a cover and concealing it. In this paper, a steganography algorithm was introduced. This algorithm used the stationary wavelet transform (SWT) and اhybrid-matrix decomposition techniques, singular value decomposition (SVD) and QR factorization to conceal a video in another video. The algorithm performance was measured with reference to the peak signal to noise ratio (PSNR) and structural similarity index measure (SSIM) for the cover and the secret videos. The algorithm successfully hid a video in another cover video and both are of the same size; the hiding capacity was 100%. The algorithm achieved a SSIM that reached 0.97 and a high PSNR value that reached 68.8 proving that the imperceptibility of the proposed algorithm is very high. The comparative analysis shows that the suggested algorit...
Robust Video Steganography Technique Against Attack Based on Stationary Wavelet Transform (SWT) and Singular Value Decomposition (SVD)
Advances in Intelligent Systems and Computing

Future Computing and Informatics Journal, 2021
Steganography is one of the most important tools in the data security field as there is a huge am... more Steganography is one of the most important tools in the data security field as there is a huge amount of data transferred each moment over the internet. Hiding secret messages in an image has been widely used because the images are mostly used in social media applications. The proposed algorithm is a simple algorithm for hiding an image in another image. The proposed technique uses QR factorization to conceal the secret image. The technique successfully hid a gray and color image in another one and the performance of the algorithm was measured by PSNR, SSIM and NCC. The PSNR for the cover image was in the range of 41 to 51 dB. DWT was added to increase the security of the method and this enhanced technique increased the cover PSNR to 48 t0 56 dB. The SSIM is 100% and the NCC is 1 for both implementations. Which improves that the imperceptibility of the algorithm is very high. The comparative analysis showed that the performance of the algorithm is better than other state-of-the-art ...
Multi-resolution Video Steganography Technique Based on Stationary Wavelet Transform (SWT) and Singular Value Decomposition (SVD)
Advances in Intelligent Systems and Computing, 2021

SSRN Electronic Journal, 2018
Video steganography aims at hiding important data in video files. Nowadays, video steganography i... more Video steganography aims at hiding important data in video files. Nowadays, video steganography is drawing much more attention. That is because videos can carry a large amount of secret data. In addition, they are transmitted frequently on the internet websites such as Facebook and YouTube imposing a larger practical significance on video steganography. In this paper, the 3D Stationary Wavelet Transform (SWT) is used to hide a secret image within video frames. The frames that contain motion are detected using the 3D SWT, then the wavelet coefficients of the secret image are hidden in the 3D SWT sub-bands. The proposed system was tested using some gray and color secret images. Different video formats were used such as MPEG, avi, mov and wmv. The experimental results show that the proposed method successfully hides the secret image within the video file with a similarity near 100% and the Peak Signal-to-Noise Ratio (PSNR) value above 30. The proposed method achieved promising results both quantitatively and qualitatively.

International Journal of Intelligent Computing and Information Sciences, 2021
Data security is one of the most important sciences nowadays. There is a huge amount of data tran... more Data security is one of the most important sciences nowadays. There is a huge amount of data transferred over the internet each moment and this data should be secured. Steganography is a type data security techniques that is used to hide the secret message into a cover object. Image steganography is the technique that hides an image in another image. This paper proposed a technique that depends on Lower-Upper (LU) decomposition. In the proposed technique LU decomposition is applied for both cover and secret images. The proposed method was tested using some gray and color images. The proposed technique achieved high results with reference to Peak Signal to Noise Ratio (PSNR), Structural Similarity Index Measure (SSIM), and Normalized Cross-Correlation (NCC). The PSNR for the cover image is ranging from 36 to 44 dB. The similarity between the secret image and the extracted image is 100% and the NCC is 1.

Bulletin of Electrical Engineering and Informatics , 2022
Internet simplified digital data transferring. This data needs to be secured; so securing digital... more Internet simplified digital data transferring. This data needs to be secured; so securing digital data becomes an important concern. Steganography provides security for data by inserting it into a cover and concealing it. In this paper, a steganography algorithm was introduced. This algorithm used the stationary wavelet transform (SWT) and اhybrid-matrix decomposition techniques, singular value decomposition (SVD) and QR factorization to conceal a video in another video. The algorithm performance was measured with reference to the peak signal to noise ratio (PSNR) and structural similarity index measure (SSIM) for the cover and the secret videos. The algorithm successfully hid a video in another cover video and both are of the same size; the hiding capacity was 100%. The algorithm achieved a SSIM that reached 0.97 and a high PSNR value that reached 68.8 proving that the imperceptibility of the proposed algorithm is very high. The comparative analysis shows that the suggested algorithm achieved higher imperceptibility than the other state-of-the-art algorithms regarding the average PSNR. The enhanced version of the proposed method was more robust against different types of attacks.
Uploads
Papers by Reham A. El-Shahed