@article{2509, keywords = {Information Technology, Steganography, Chain Code, DCT}, author = {Tawfiq Al-asadi and Israa Hadi Ali and kadhem kareem Abdul Abdul Abdul kadhem}, title = {A New Approach for Hiding Image Based on the Signature of Coeficients}, abstract = {This paper presents a new approach for hiding the secret image inside another image file, depending on the signature of coefficients. The proposed system consists of two general stages. The first one is the hiding stage which consist of the following steps (Read the cover image and message image, Block collections using the chain code and similarity measure, Apply DCT Transform, Signature of coefficients, Hiding algorithm , Save information of block in boundary, Reconstruct block to stego image and checking process). The second stage is extraction stage which consist of the following steps ( read the stego image, Extract information of block from boundary, Block collection, Apply DCT transform, Extract bits of message and save it to buffer, Extracting message).}, year = {2015}, journal = {International Journal of Interactive Multimedia and Artificial Intelligence}, volume = {3}, number = {5}, pages = {13-22}, month = {12/2015}, issn = {1989-1660}, url = {http://www.ijimai.org/journal/sites/default/files/files/2015/11/ijimai20153_5_2_pdf_10078.pdf}, doi = {10.9781/ijimai.2015.352}, }