A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages

R. J. Rasras, Z. A. AlQadi, M. R. A. Sara


Steganography and cryptography are very important techniques used in data security to hide and secure secret messages in transmitted data. This paper will introduce, implement and test a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting. Some efficiency parameters will be experimentally obtained and compared with other existing methods parameters to prove the efficiency of the proposed methodology.


steganography; cryptography; encryption time; decryption time; speedup; MSE; PSNR

Full Text:



A. A. Moustafa, Z. A. Alqadi, “Color Image Reconstruction Using A New R'G'I Model”, Journal of Computer Science, Vol. 5, No. 4, pp. 250-254, 2009

K Matrouk, A Al-Hasanat, H Alasha'ary, Z. Al-Qadi, H Al-Shalabi, “Speech fingerprint to identify isolated word person”, World Applied Sciences Journal, Vol. 31, No. 10, pp. 1767-1771, 2014

J. Al-Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, M. Abu-Zaher, “A Novel zero-error method to create a secret tag for an image”, Journal of Theoretical and Applied Information Technology, Vol. 96. No. 13, pp. 4081-4091, 2018

M. Jose, “Hiding Image in Image Using LSB Insertion Method with ImprovedSecurity and Quality”, International Journal of Science and Research, Vol. 3, No. 9, pp. 2281-2284, 2014

R. M. Patel, D. J. Shah, “Conceal gram :Digital image in image using LSB insertion method”, International Journal of Electronics and Communication Engineering & Technology, Vol. 4, No. 1, pp. 230-2035, 2013

N. Akhtar, P. Johri, S. Khan, “Enhancing the security and quality ofLSB based image steganography”, 5th International Conference on Computational Intelligence and Communication Networks, Mathura, India, Seprember 27-29, 2013

M. Juneja, P. S. Sandhu, “An improved LSB based Steganography with enhanced Security and Embedding/Extraction”, 3rd International Conference on Intelligent Computational Systems, Hong Kong China, January 26-27, 2013

J. Nadir, Z. Alqadi, A. Abu Ein, “Classification of Matrix Multiplication, Methods Used to Encrypt-decrypt Color Image”, International Journal of Computer and Information Technology, Vol. 5, No. 5, pp. 459-464, 2016

R. C. Gonzalez, R. Elwood, Digital Image Processing, Addison-Wesley, New York, 1992

J. N. Abdel-Jalil, “Performance analysis of color image encryption/decryption techniques”, International Journal of Advanced Computer Technology, Vol. 5, No. 4, pp. 13-17, 2016

T. Sivakumar, R. Venkatesan, “A Novel Image Encryption Approach using Matrix Reordering”, WSEAS Transactions on Computers, Vol. 12, No. 11, pp. 407-418, 2013

H. Gao, Y. Zhang, S. Liang, D. Li, “A New Chaotic Algorithm for Image Encryption”, Chaos, Solitons & Fractals, Vol. 29, No. 2, pp. 393-399, 2006

G. Chen, Y. Mao, C. K. Chui, “A Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps”, Chaos, Solitons and Fractals, Vol. 21, No. 3, pp.749-761, 2004

K. Loukhaoukha, J. Y. Chouinard, A. Berdai, “A Secure Image Encryption Algorithm Based on Rubik's Cube Principle”, Journal of Electrical and Computer Engineering, Vol. 2012, ArticleID 173931, 2011

X. Wang, J. Zhang, “An Image Scrambling Encryption using Chaos- controlled Poker Shuffle Operation”, IEEE International Symposium on Biometrics and Security Technologies, Islamabad, Pakistan, April 23-24, 2008

eISSN: 1792-8036     pISSN: 2241-4487