Using Electrical Square Wave Form as an Efficient Carrying Media
Received: 26 February 2025 | Revised: 9 April 2025 | Accepted: 19 April 2025 | Online: 4 June 2025
Corresponding author: Sara Al-Omari
Abstract
This paper proposes an efficient and simplified method of secret message steganography. The proposed method is characterized by its simplicity, efficiency, and security, which are achieved by utilizing a Square Wave (SW) signal as a carrying media. This signal can be readily generated, and its size can be controlled by the generation time and the sampling frequency. The SW signal can be efficiently processed; the samples can be readily converted from decimal fractions to binary, and from binary to decimal fractions. The 64-bit binary representation is employed to represent the sample values. This allows for the utilization of more Least Significant Bits (LSBs) for message hiding. The proposed method utilizes a set of LSBs for message hiding, with the length of this set ranging from 1 to 32 LSBs. The Private Key (PK) is used to determine the length of the set of LSBs and the sequence of LSBs employed for message hiding-extracting. The proposed method exhibits a high degree of sensitivity to the selected values of the PK. To ensure the efficacy of the hiding and extracting processes, it is imperative that these processes utilize precisely the same PK. The proposed method is implemented through the utilization of a variety of messages and PKs, and its efficacy in preserving the integrity of the stego SW is demonstrated. Furthermore, the sensitivity and the speed of the method are assessed to ensure that the proposed method meets the requirements of a effective stego method.
Keywords:
carrying square wave, noise, stego square wave, secret message, Private Key (PK), Least Significant Bits (LSBs)Downloads
References
M. A. F. Al-Husainy, "Comparison Study Between Classic-LSB, SLSB and DSLSB Image Steganography," in 6th International Conference on Information Technology (Cloud Computing), Amman , Jordan, 2013.
Z. A. A. Alqadi, M. K. Abu Zalata, and G. M. Qaryouti, "Comparative Analysis of Color Image Steganography," International Journal of Computer Science and Mobile Computing, vol. 5, no. 11, pp. 37–43, Nov. 2016.
J. R. Rodriguez, J. W. Dixon, J. R. Espinoza, J. Pontt, and P. Lezana, "PWM regenerative rectifiers: state of the art," IEEE Transactions on Industrial Electronics, vol. 52, no. 1, pp. 5–22, Feb. 2005.
M. Abuzalata, Z. Alqadi, J. Al-Azzeh, and Q. Jaber, "Modified Inverse LSB Method for Highly Secure Message Hiding," International Journal of Computer Science and Mobile Computing, vol. 8, no. 2, pp. 93–103, Feb. 2019.
R. J. Rasras, Z. A. AlQadi, and M. R. A. Sara, "A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages," Engineering, Technology & Applied Science Research, vol. 9, no. 1, pp. 3681–3684, Feb. 2019.
X. Zhou, W. Gong, W. Fu, and L. Jin, "An improved method for LSB based color image steganography combined with cryptography," in 2016 IEEE/ACIS 15th International Conference on Computer and Information Science, Okayama, Japan, 2016, pp. 1–4.
D.-C. Wu and W.-H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, vol. 24, no. 9, pp. 1613–1626, Jun. 2003.
R. Das and I. Das, "Secure data transfer in IoT environment: Adopting both cryptography and steganography techniques," in 2016 Second International Conference on Research in Computational Intelligence and Communication Networks, Kolkata, India, 2016, pp. 296–301.
R. J. Rasras, M. R. A. Sara, Z. A. AlQadi, and R. A. Zneit, "Comparative Analysis of LSB, LSB2, PVD Methods of Data Steganography," International Journal of Advanced Trends in Computer Science and Engineering, vol. 8, no. 3, pp. 748–754, Jun. 2019.
A. Y. Al-Rawashdeh and Z. Al-Qadi, "Using Wave Equation to Extract Digital Signal Features," Engineering, Technology & Applied Science Research, vol. 8, no. 4, pp. 3153–3156, Aug. 2018.
K. Matrouk, A. Al-Hasanat, H. Alasha'ary, Z. Al-Qadi, and H. Al-Shalabi, "Speech Fingerprint to Identify Isolated Word-Person," World Applied Sciences Journal, vol. 31, no. 11, pp. 1767–1771, 2014.
S. Khawatreh, B. Ayyoub, A. Abu-Ein, and Z. Alqadi, "A Novel Methodology to Extract Voice Signal Features," International Journal of Computer Applications, vol. 179, no. 9, pp. 40–43, Jan. 2018.
Z. Alqadi, B. Zahran, Q. Jaber, B. Ayyoub, and J. Al-Azzeh, "Enhancing the Capacity of LSB Method by Introducing LSB2Z Method," International Journal of Computer Science and Mobile Computing, vol. 8, no. 3, pp. 76–90, Mar. 2019.
M. O. Al-Dwairi, Z. A. Alqadi, A. A. AbuJazar, and R. A. Zneit, "Optimized True-Color Image Processing," World Applied Sciences Journal, vol. 8, no. 10, pp. 1175–1182, 2010.
W. A. Ulbeh, A. Moustafa, and Z. A. Alqadi, "Gray image reconstruction," European Journal of Scientific Research, vol. 27, no. 2, pp. 167–173, Jan. 2009.
A. A. Moustafa and Z. A. Alqadi, "Color Image Reconstruction Using A New R'G'I Model," Journal of Computer Science, vol. 5, no. 4, pp. 250–254, Apr. 2009.
H. A. Alasha'ary, K. M. Matrouk, A. I. Al-Hasanat, Z. A. Alqadi, and H. M. Al-Shalabi, "Improving Matrix Multiplication Using Parallel Computing," International Journal on Information Technology, vol. 1, no. 6, pp. 346–349, Nov. 2013.
B. Zahran, Z. Alqadi, J. Nader, and A. A. Ein, "A Comparison Between Parallel and Segmentation Methods Used for Image Encryption-Decryption," International Journal of Computer Science and Information Technology, vol. 8, no. 5, pp. 127–133, Oct. 2016.
K. Matrouk, A. Al-Hasana, H. Alasha'ary, Z. Al-Qadi, and H. Al-Shalabi, "Analysis of Matrix Multiplication Computational Methods," European Journal of Scientific Research, vol. 121, no. 3, pp. 258–266, 2014.
J. Al-Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, and M. Mesleh, "A Novel Based On Image Blocking Method To Encrypt-Decrypt Color," JOIV : International Journal on Informatics Visualization, vol. 3, no. 1, pp. 86–93, Jan. 2019.
J. Al-Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, and M. Abu-Zaher, "A Novel Zero-Error Method to Create a Secret Tag for an Image," Journal of Theoretical and Applied Information Technology, vol. 96, no. 13, pp. 4081–4091, Jul. 2018.
J. Al-Azzeh, Z. Alqadi, and Q. M. Jabber, "Statistical Analysis of Methods used to Enhance RGB Color Image Histogram," in XX International Scientific and Technical Conference, Kursk, Russia, 2017, pp. 8–15.
J. Al-Azzeh, H. Alhatamleh, Z. A. Alqadi, and M. K. Abuzalata, "Creating a Color Map to be used to Convert a Gray Image to Color Image," International Journal of Computer Applications, vol. 153, no. 2, pp. 31–34, Nov. 2016.
R. J. Rasras, M. Abuzalata, Z. Alqadi, J. Al-Azzeh, and Q. Jaber, "Comparative Analysis of Color Image Encryption-Decryption Methods Based on Matrix Manipulation," International Journal of Computer Science and Mobile Computing, vol. 18, no. 3, pp. 14–26, Mar. 2019.
A. AlQaisi, M. AlTarawneh, Z. A. Alqadi, and A. A. Sharadqah, "Analysis of color image features extraction using texture methods," TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 3, pp. 1220–1225, Jun. 2019.
B. Zahran, J. Al-Azzeh, Z. Alqadi, A. Al, M.-A. Al-Zoghoul, and S. Khawatreh, "A Modified LBP Method to Extract Features from Color Images," Journal of Theoretical and Applied Information Technology, vol. 96, no. 10, pp. 3014–3024, May 2018.
J. Al-Azzeh, B. Zahran, and Z. Alqadi, "Salt and Pepper Noise: Effects and Removal," JOIV : International Journal on Informatics Visualization, vol. 2, no. 4, pp. 252–256, Jul. 2018.
J. Nader, Z. A. A. Alqadi, and B. Zahran, "Analysis of Color Image Filtering Methods," International Journal of Computer Applications, vol. 174, no. 8, pp. 12–17, Sep. 2017.
Z. Alqadi, B. Zahran, and J. Nader, "Estimation and Tuning of FIR Lowpass Digital Filter Parameters," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 7, no. 2, pp. 18–23, Mar. 2017.
M. M. Abu-Faraj, Z. A. Alqadi, and K. Aldebei, "Comparative Analysis of Fingerprint Features Extraction Methods," Journal of Hunan University Natural Sciences, vol. 48, no. 12, pp. 177–182, Dec. 2021.
M. T. Barakat and Z. A. Alqadi, "Highly Secure Method for Secret Data Transmission," International Journal of Scientific Engineering and Science, vol. 6, no. 1, pp. 49–55, Jan. 2022.
M. M. Abu-Faraj and Z. A. Alqadi, "Rounds Reduction and Blocks Controlling to Enhance the Performance of Standard Method of Data Cryptography," International Journal of Computer Science and Network Security, vol. 21, no. 12, pp. 648–656, Dec. 2021.
M. Abu-Faraj, K. Aldebei, and Z. Alqadi, "Deep Machine Learning to Enhance ANN Performance: Fingerprint Classifier Case Study," Journal of Southwest Jiaotong University, vol. 56, no. 6, pp. 685–694, Dec. 2021.
M. M. Abu-Faraj and Z. A. Alqadi, "Improving the Efficiency and Scalability of Standard Methods for Data Cryptography," International Journal of Computer Science and Network Security, vol. 21, no. 12, pp. 451–458, Dec. 2021.
M. M. Abu-Faraj and Z. A. Alqadi, "Using Highly Secure Data Encryption Method for Text File Cryptography," International Journal of Computer Science and Network Security, vol. 21, no. 12, pp. 53–60, Dec. 2021.
A. Hindi, M. O. Dwairi, and Z. Alqadi, "Procedures for Speech Recognition using LPC And ANN," International Journal of Engineering Technology Research & Management, vol. 4, no. 2, pp. 48–55, Feb. 2020.
Z. A. Alqadi and M. T. Barakat, "A Case Study to Improve the Quality of Median Filter," International Journal of Computer Science and Mobile Computing, vol. 10, no. 11, pp. 19–28, Nov. 2021.
H. Zaini and Z. Alqadi, "High Salt and Pepper Noise Ratio Reduction," International Journal of Computer Science and Mobile Computing, vol. 10, no. 9, pp. 88–97, Sep. 2021.
M. K. Abu Zalata, H. N. Hatamleh, and Z. A. Alqadi, "Detailed Study of Low Density Salt and Pepper Noise Removal from Digital Color Images," International Journal of Computer Science and Mobile Computing, vol. 11, no. 2, pp. 56–67, Feb. 2022.
M. Abu-Faraj, A. Al-Hyari, K. Aldebei, Z. A. Alqadi, and B. Al-Ahmad, "Rotation Left Digits to Enhance the Security Level of Message Blocks Cryptography," IEEE Access, vol. 10, pp. 69388–69397, 2022.
M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, "Experimental Analysis of Methods Used to Solve Linear Regression Models," Computers, Materials & Continua, vol. 72, no. 3, pp. 5699–5712, Apr. 2022.
M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, "A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography," Symmetry, vol. 14, no. 4, Apr. 2022, Art. no. 664.
M. M. Abu-Faraj, K. Aldebei, and Z. A. Alqadi, "Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography," Traitement du Signal, vol. 39, no. 1, pp. 173–178, Feb. 2022.
M. M. Abu-Faraj and M. Zubi, "Analysis and implementation of kidney stones detection by applying segmentation techniques on computerized tomography scans," Italian Journal of Pure and Applied Mathematics, no. 43, pp. 590–602, Feb. 2020.
Z. Alqadi, "Bits Substitution to Secure LSB Method of Data Steganography," International Journal of Computer Science and Mobile Computing, vol. 11, no. 8, pp. 9–21, Aug. 2022.
M. S. Khrisat and Z. A. Alqadi, "Enhancing LSB Method Performance Using Secret Message Segmentation," International Journal of Computer Science & Network Security, vol. 22, no. 7, pp. 383–388, Jul. 2022.
M. S. Khrisat, A. Manasreh, H. G. Zaini, and Z. A. Alqadi, "Cover Image Rearrangement to Secure LSB Method of Data Steganography," ARPN Journal of Engineering and Applied Sciences, vol. 17, no. 3, pp. 295–302, Feb. 2022.
M. K. A. Zalata, M. T. Barakat, and Z. A. Alqadi, "Carrier Image Rearrangement to Enhance the Security Level of LSB Method of Data Steganography," International Journal of Computer Science and Mobile Computing, vol. 11, no. 1, pp. 182–193, Jan. 2022.
M. T. Barakat and Z. A. Alqadi, "Image Transformation to Increase the Security Level of LBS Method of Data Steganography," International Journal of Engineering Technology Research & Management, vol. 6, no. 1, pp. 42–53, Jan. 2022.
N. Asad, I. Shayeb, Q. Jaber, B. Ayyoub, Z. Alqadi, and A. Sharadqh, "Creating a Stable and Fixed Features Array for Digital Color Image," International Journal of Computer Science and Mobile Computing, vol. 8, no. 8, pp. 50–62, Aug. 2019.
M. O. Al-Dwairi, A. Y. Hendi, M. S. Soliman, and Z. A. A. AlQadi, "A new method for voice signal features creation," International Journal of Electrical and Computer Engineering, vol. 9, no. 5, pp. 4092–4098, Oct. 2019.
A. A. Moustafa and Z. A. Alqadi, "A Practical Approach of Selecting the Edge Detector Parameters to Achieve a Good Edge Map of the Gray Image," Journal of Computer Science, vol. 5, no. 5, pp. 355–362, May 2009.
Z. A. A. Alqadi, M. Aqel, and I. M. M. El Emary, "Performance Analysis and Evaluation of Parallel Matrix Multiplication Algorithms," World Applied Sciences Journal, vol. 5, no. 2, pp. 211–214, 2008.
I. Shayeb, N. Asad, Z. Alqadi, and Q. Jaber, "Evaluation of speech signal features extraction methods," Journal of Applied Science, Engineering, Technology, and Education, vol. 2, no. 1, pp. 69–78, May 2020.
A. Kaur, R. Dhir, and G. Sikka, "A New Image Steganography Based On First Component Alteration Technique." arXiv, Jan. 12, 2010.
A. Martin, G. Sapiro, and G. Seroussi, "Is image steganography natural?," IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2040–2050, Dec. 2005.
D. Bhattacharyya, A. Roy, P. Roy, and T. Kim, "Receiver Compatible Data Hiding in Color Image," International Journal of Advanced Science and Technology, vol. 6, pp. 15–24, May 2009.
N. A. Aletawi, M. A. A. Sameha, and Z. Alqadi, "Modified LSB2 Steganography Method to Secure the Embedded Secret Message," International Journal of Computer Science and Mobile Computing, vol. 11, no. 8, pp. 22–44, Aug. 2022.
D. Pleacher. "Calculating Password Entropy." Pleacher. https://www.pleacher.com/mp/mlessons/algebra/entropy.html.
H. G. Zaini, "Image Segmentation to Secure LSB2 Data Steganography," Engineering, Technology & Applied Science Research, vol. 11, no. 1, pp. 6632–6636, Feb. 2021.
Downloads
How to Cite
License
Copyright (c) 2025 Sara Al-Omari

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.