A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages

Authors

  • R. J. Rasras Department of Computer Engineering, Al-Balqa' Applied University, Jordan
  • Z. A. AlQadi Department of Computer Engineering, Al-Balqa' Applied University, Jordan
  • M. R. A. Sara Department of Computer Science, Taibah University, Saudi Arabia
Volume: 9 | Issue: 1 | Pages: 3681-3684 | February 2019 | https://doi.org/10.48084/etasr.2380

Abstract

Steganography and cryptography are very important techniques used in data security to hide and secure secret messages in transmitted data. This paper will introduce, implement and test a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting. Some efficiency parameters will be experimentally obtained and compared with other existing methods parameters to prove the efficiency of the proposed methodology.

Keywords:

steganography, cryptography, encryption time, decryption time, speedup, MSE, PSNR

Downloads

Download data is not yet available.

References

A. A. Moustafa, Z. A. Alqadi, “Color Image Reconstruction Using A New R'G'I Model”, Journal of Computer Science, Vol. 5, No. 4, pp. 250-254, 2009 DOI: https://doi.org/10.3844/jcs.2009.250.254

K Matrouk, A Al-Hasanat, H Alasha'ary, Z. Al-Qadi, H Al-Shalabi, “Speech fingerprint to identify isolated word person”, World Applied Sciences Journal, Vol. 31, No. 10, pp. 1767-1771, 2014

J. Al-Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, M. Abu-Zaher, “A Novel zero-error method to create a secret tag for an image”, Journal of Theoretical and Applied Information Technology, Vol. 96. No. 13, pp. 4081-4091, 2018

M. Jose, “Hiding Image in Image Using LSB Insertion Method with ImprovedSecurity and Quality”, International Journal of Science and Research, Vol. 3, No. 9, pp. 2281-2284, 2014

R. M. Patel, D. J. Shah, “Conceal gram :Digital image in image using LSB insertion method”, International Journal of Electronics and Communication Engineering & Technology, Vol. 4, No. 1, pp. 230-2035, 2013

N. Akhtar, P. Johri, S. Khan, “Enhancing the security and quality ofLSB based image steganography”, 5th International Conference on Computational Intelligence and Communication Networks, Mathura, India, Seprember 27-29, 2013 DOI: https://doi.org/10.1109/CICN.2013.85

M. Juneja, P. S. Sandhu, “An improved LSB based Steganography with enhanced Security and Embedding/Extraction”, 3rd International Conference on Intelligent Computational Systems, Hong Kong China, January 26-27, 2013

J. Nadir, Z. Alqadi, A. Abu Ein, “Classification of Matrix Multiplication, Methods Used to Encrypt-decrypt Color Image”, International Journal of Computer and Information Technology, Vol. 5, No. 5, pp. 459-464, 2016

R. C. Gonzalez, R. Elwood, Digital Image Processing, Addison-Wesley, New York, 1992

J. N. Abdel-Jalil, “Performance analysis of color image encryption/decryption techniques”, International Journal of Advanced Computer Technology, Vol. 5, No. 4, pp. 13-17, 2016

T. Sivakumar, R. Venkatesan, “A Novel Image Encryption Approach using Matrix Reordering”, WSEAS Transactions on Computers, Vol. 12, No. 11, pp. 407-418, 2013

H. Gao, Y. Zhang, S. Liang, D. Li, “A New Chaotic Algorithm for Image Encryption”, Chaos, Solitons & Fractals, Vol. 29, No. 2, pp. 393-399, 2006 DOI: https://doi.org/10.1016/j.chaos.2005.08.110

G. Chen, Y. Mao, C. K. Chui, “A Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps”, Chaos, Solitons and Fractals, Vol. 21, No. 3, pp.749-761, 2004 DOI: https://doi.org/10.1016/j.chaos.2003.12.022

K. Loukhaoukha, J. Y. Chouinard, A. Berdai, “A Secure Image Encryption Algorithm Based on Rubik's Cube Principle”, Journal of Electrical and Computer Engineering, Vol. 2012, ArticleID 173931, 2011 DOI: https://doi.org/10.1155/2012/173931

X. Wang, J. Zhang, “An Image Scrambling Encryption using Chaos- controlled Poker Shuffle Operation”, IEEE International Symposium on Biometrics and Security Technologies, Islamabad, Pakistan, April 23-24, 2008

Downloads

How to Cite

[1]
R. J. Rasras, Z. A. AlQadi, and M. R. A. Sara, “A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages”, Eng. Technol. Appl. Sci. Res., vol. 9, no. 1, pp. 3681–3684, Feb. 2019.

Metrics

Abstract Views: 1263
PDF Downloads: 782

Metrics Information

Most read articles by the same author(s)