- Abstract viewed - 732 times
- Pdf downloaded - 379 times
Affiliations
Alaa Jabbar Qasim almaliki
School of Computing, Universiti Utara Malaysia (UUM), 06010 Sintok, Kedah, MALAYSIA
Roshidi Din
School of Computing, Universiti Utara Malaysia (UUM), 06010 Sintok, Kedah, MALAYSIA
Sunariya Utama
School of Computing, Universiti Utara Malaysia (UUM), 06010 Sintok, Kedah, MALAYSIA
Salam Ghanim Najeeb
Department of Medical Laboratories, College of Health and Medical Techniques, Sawa University, Almuthana, Iraq
Jabbar Qasim Almaliki
Ashur University, Department of Medical Instrumentation Technique Engineering College, Baghdad, Iraq
How to Cite
Information Hiding in Image Using Amplitude Modulation Algorithm
- Alaa Jabbar Qasim almaliki ,
- Roshidi Din ,
- Sunariya Utama ,
- Salam Ghanim Najeeb ,
- Jabbar Qasim Almaliki
Vol 6 No 4 (2023): December
Submitted: Dec 18, 2023
Published: Dec 27, 2023
Abstract
With the development of technology, information is now transmitted through digital media. At this point, the concept of information security gains importance. It is the most valuable meta-information today. Many methods have been designed to transmit information in secure ways. While encryption, which is one of these methods, aims to protect the content of the message, steganography aims to hide the message's existence. Greek word meaning "hidden writing" steganography aimed to hide the existence of data. In this study, amplitude modulation, which is one of the steganography algorithms, the algorithm is examined.