A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages
Abstract
Steganography and cryptography are very important techniques used in data security to hide and secure secret messages in transmitted data. This paper will introduce, implement and test a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting. Some efficiency parameters will be experimentally obtained and compared with other existing methods parameters to prove the efficiency of the proposed methodology.
Keywords:
steganography, cryptography, encryption time, decryption time, speedup, MSE, PSNRDownloads
References
A. A. Moustafa, Z. A. Alqadi, “Color Image Reconstruction Using A New R'G'I Model”, Journal of Computer Science, Vol. 5, No. 4, pp. 250-254, 2009 DOI: https://doi.org/10.3844/jcs.2009.250.254
K Matrouk, A Al-Hasanat, H Alasha'ary, Z. Al-Qadi, H Al-Shalabi, “Speech fingerprint to identify isolated word person”, World Applied Sciences Journal, Vol. 31, No. 10, pp. 1767-1771, 2014
J. Al-Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, M. Abu-Zaher, “A Novel zero-error method to create a secret tag for an image”, Journal of Theoretical and Applied Information Technology, Vol. 96. No. 13, pp. 4081-4091, 2018
M. Jose, “Hiding Image in Image Using LSB Insertion Method with ImprovedSecurity and Quality”, International Journal of Science and Research, Vol. 3, No. 9, pp. 2281-2284, 2014
R. M. Patel, D. J. Shah, “Conceal gram :Digital image in image using LSB insertion method”, International Journal of Electronics and Communication Engineering & Technology, Vol. 4, No. 1, pp. 230-2035, 2013
N. Akhtar, P. Johri, S. Khan, “Enhancing the security and quality ofLSB based image steganography”, 5th International Conference on Computational Intelligence and Communication Networks, Mathura, India, Seprember 27-29, 2013 DOI: https://doi.org/10.1109/CICN.2013.85
M. Juneja, P. S. Sandhu, “An improved LSB based Steganography with enhanced Security and Embedding/Extraction”, 3rd International Conference on Intelligent Computational Systems, Hong Kong China, January 26-27, 2013
J. Nadir, Z. Alqadi, A. Abu Ein, “Classification of Matrix Multiplication, Methods Used to Encrypt-decrypt Color Image”, International Journal of Computer and Information Technology, Vol. 5, No. 5, pp. 459-464, 2016
R. C. Gonzalez, R. Elwood, Digital Image Processing, Addison-Wesley, New York, 1992
J. N. Abdel-Jalil, “Performance analysis of color image encryption/decryption techniques”, International Journal of Advanced Computer Technology, Vol. 5, No. 4, pp. 13-17, 2016
T. Sivakumar, R. Venkatesan, “A Novel Image Encryption Approach using Matrix Reordering”, WSEAS Transactions on Computers, Vol. 12, No. 11, pp. 407-418, 2013
H. Gao, Y. Zhang, S. Liang, D. Li, “A New Chaotic Algorithm for Image Encryption”, Chaos, Solitons & Fractals, Vol. 29, No. 2, pp. 393-399, 2006 DOI: https://doi.org/10.1016/j.chaos.2005.08.110
G. Chen, Y. Mao, C. K. Chui, “A Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps”, Chaos, Solitons and Fractals, Vol. 21, No. 3, pp.749-761, 2004 DOI: https://doi.org/10.1016/j.chaos.2003.12.022
K. Loukhaoukha, J. Y. Chouinard, A. Berdai, “A Secure Image Encryption Algorithm Based on Rubik's Cube Principle”, Journal of Electrical and Computer Engineering, Vol. 2012, ArticleID 173931, 2011 DOI: https://doi.org/10.1155/2012/173931
X. Wang, J. Zhang, “An Image Scrambling Encryption using Chaos- controlled Poker Shuffle Operation”, IEEE International Symposium on Biometrics and Security Technologies, Islamabad, Pakistan, April 23-24, 2008
Downloads
How to Cite
License
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.