International Journal of Computer Science and Mobile Computing (IJCSMC)
Every few years' computer security has to re-invent itself. New technologies and applications bring new threats, and force the authors to invent new protection mechanisms. Text hiding in image is the proposed system; this proposed system consists of four stages, preprocessing stage, embedding stage, extracting stage and post-processing stage. Each stage it is as follow, the pre-processing stage consists two phases, the first is converting phase which convert the text and cover into binary form, the second is coding phase which code the embedded data.