01413nas a2200229 4500000000100000000000100001008004100002260001200043653002700055653001800082653001500100653000800115100002000123700001900143700004300162245007400205856009800279300001000377490000600387520077600393022001401169 2015 d c12/201510aInformation Technology10aSteganography10aChain Code10aDCT1 aTawfiq Al-asadi1 aIsraa Hadi Ali1 akadhem kareem Abdul Abdul Abdul kadhem00aA New Approach for Hiding Image Based on the Signature of Coeficients uhttp://www.ijimai.org/journal/sites/default/files/files/2015/11/ijimai20153_5_2_pdf_10078.pdf a13-220 v33 aThis paper presents a new approach for hiding the secret image inside another image file, depending on the signature of coefficients. The proposed system consists of two general stages. The first one is the hiding stage which consist of the following steps (Read the cover image and message image, Block collections using the chain code and similarity measure, Apply DCT Transform, Signature of coefficients, Hiding algorithm , Save information of block in boundary, Reconstruct block to stego image and checking process). The second stage is extraction stage which consist of the following steps ( read the stego image, Extract information of block from boundary, Block collection, Apply DCT transform, Extract bits of message and save it to buffer, Extracting message). a1989-1660