Work place: Qassim University, Computer Engineering Department, Qassim, Saudi Arabia
Research Interests: Information Security, Network Architecture, Network Security, Image Processing, Information-Theoretic Security
Mr. M. Sajid Mohammadi has completed his B.E degree in Computer Technology from the Yashwantrao Chavan College of Engineering, Nagpur University, India. He did his M. Tech. Computer Engineering from the NMIMS University, Vile Parle Mumbai, India. He is pursuing his Ph.D. from Noida International University NCR Delhi, India. He has total 16 years of experience including 1.5 years industrial experience in Reliance Petroleum Mumbai and 13.5 years of teaching experience. He is currently working as Lecturer in Computer Engineering Department, Qassim University Saudi Arabia. His research interest includes Image Processing, Information Hiding, and Information/Network Security. He is a member of Saudi Internet Scientific Society for the year 2017-18.
DOI: https://doi.org/10.5815/ijcnis.2019.01.02, Pub. Date: 8 Jan. 2019
Steganography is the technique for exchanging concealed secret information in a way to avoid suspicion. The aim of Steganography is to transfer secrete message to another party by hiding the data in a cover object, so that the imposter who monitors the traffic should not distinguish between genuine secret message and the cover object. This paper presents the comparative study and performance analysis of different image Steganography methods using various types of cover media ((like BMP/JPEG/PNG etc.) with the discussion of their file formats. We also discuss the embedding domains along with a discussion on salient technical properties, applications, limitations, and Steganalysis.[...] Read more.
DOI: https://doi.org/10.5815/ijigsp.2017.06.02, Pub. Date: 8 Jun. 2017
In this paper, we propose a novel JPEG image Steganography algorithm based on partition schemes on image coefficient values. Our method selects the AC and DC coefficients of a JPEG image according to a channel selection method and then identifies appropriate coefficients to store the secret data-bits. As opposed to other reported works, in our algorithm each selected coefficient can store a variable number of data-bits that are decided using the concept called ‘Partition Scheme’. Experimental results indicate the suitability of the proposed algorithm as compared to other existing methods.[...] Read more.
Subscribe to receive issue release notifications and newsletters from MECS Press journals