Multilevel hiding text security using hybrid technique steganography and cryptography

  • Authors

    • Noor Hasan Hassoon
    • Rajaa Ahmed Ali
    • Hazim Noman Abed
    • Adel Abdul-Jabbar Alkhazraji
    https://doi.org/10.14419/ijet.v7i4.21752
  • Information security in the recent decades has become one of the main topics in communication systems. Security of information de-pended on strength of the keys in the Cryptographic and Steganographic processes. In this paper, a few techniques are used to implement both steganography and cryptography. The process of hiding data in this research goes through several processes, as follows: the first process is to encrypt a secret message through the use of Blowfish algorithm to generate the key that will be used in the encryption process and XOR it with a secret message. The second process, hiding positions are determined by using the edge detection algorithm to a cover image. After that, the bats algorithm will be applied to the cover image resulted by edge detection to choose random hiding positions in edge detection image. The last stage is to embed the secret message in a cover image using the least significant bit. Fig2 shows the opera-tions achieved on the secret message.

  • References

    1. [1] Chauhan, Shivani, Janmejai Kumar, and Amit Doegar. "Multiple layer text security using variable block size cryptography and image steganography." In Computational Intelligence & Communication Technology (CICT), 2017 3rd International Conference on, pp. 1-7. IEEE, 2017.

      [2] William, Stallings. "Cryptography and network security: principles and practice." Prentice-Hall, Inc (1999): 23-50.

      [3] Johnson, Neil F., and Sushil Jajodia. "Exploring Steganography: Seeing the unseen." Computer 31, no. 2 (1998). https://doi.org/10.1109/MC.1998.4655281.

      [4] Atawneh, Samer, and Putra Sumari. "Hybrid and blind steganographic method for digital Images based on DWT and chaotic map." Journal of Communications 8, no. 11 (2013): 690-699. https://doi.org/10.12720/jcm.8.11.690-699.

      [5] Macrakis, Kristie. "Confessing secrets: Secret communication and the origins of modern science." Intelligence and National Security 25, no. 2 (2010): 183-197. https://doi.org/10.1080/02684527.2010.489275.

      [6] Luo, Xiangyang, Fenlin Liu, Chunfang Yang, Shiguo Lian, and Ying Zeng. "Steganalysis of adaptive image steganography in multiple gray code bit-planes." Multimedia Tools and Applications 57, no. 3 (2012): 651-667. https://doi.org/10.1007/s11042-010-0663-3.

      [7] Joshi, Kamaldeep, and Rajkumar Yadav. "A new LSB-S image steganography method blend with Cryptography for secret communication." In Image Information Processing (ICIIP), 2015 Third International Conference on, pp. 86-90. IEEE, 2015. https://doi.org/10.1109/ICIIP.2015.7414745.

      [8] Albayaty, Ismael Salih, Ahmed Luay Ahmed, Noor Hasan Hassoon, and Hazim Noman Abed. "Hiding Information in an Image Based on Bats Algorithm." Iraqi Journal of Information Technology 8, no. 2 .(2018): 128-141

      [9] Saritha, M., Vishwanath M. Khadabadi, and M. Sushravya. "Image and text steganography with cryptography using MATLAB." In Signal Processing, Communication, Power and Embedded System (SCOPES), 2016 International Conference on, pp. 584-587. IEEE, 2016.

      [10] Cheddad, Abbas, Joan Condell, Kevin Curran, and Paul Mc Kevitt. "Digital image steganography: Survey and analysis of current methods." Signal processing 90, no. 3 (2010): 727-752. https://doi.org/10.1016/j.sigpro.2009.08.010.

      [11] Manku, Saikumar, and K. Vasanth. "Blowfish encryption algorithm for information security." ARPN Journal of Engineering and Applied Sciences 10, no. 10 (2015): 4717-4719.

      [12] Smitha, G. L., and E. Baburaj. "Sobel edge detection technique implementation for image steganography analysis." Biomedical Research 29 (2018).

      [13] Yang, Xin-She. "A new metaheuristic bat-inspired algorithm." In Nature inspired cooperative strategies for optimization (NICSO 2010), pp. 65-74. Springer, Berlin, Heidelberg, 2010. https://doi.org/10.1007/978-3-642-12538-6_6.

      [14] Taha, Anass, Mohamed Hachimi, and Ali Moudden. "A discrete Bat Algorithm for the vehicle routing problem with time windows." In Logistics and Supply Chain Management (LOGISTIQUA), 2017 International Colloquium on, pp. 65-70. IEEE, 2017.

      [15] Ahmed, Diaa EM, and Othman O. Khalifa. "Robust and Secure Image Steganography Based on Elliptic Curve Cryptography." In 2014 International Conference on Computer & Communication Engineering (ICCCE), pp. 288-291. IEEE, 2014.

      [16] Samidha, Diwedi, and Dipesh Agrawal. "Random image steganography in spatial domain." In Emerging trends in VLSI, embedded system, nano electronics and telecommunication system (ICEVENT), 2013 international conference on, pp. 1-3. IEEE, 2013.

      [17] Abed, Hazim Noman. "Robust and Secured Image Steganography using LSB and Encryption with QR Code." Journal of AL-Qadisiyah for computer science and mathematics 9, no. 2 (2017): 1-9.

  • Downloads

  • How to Cite

    Hassoon, N. H., Ali, R. A., Abed, H. N., & Alkhazraji, A. A.-J. (2018). Multilevel hiding text security using hybrid technique steganography and cryptography. International Journal of Engineering & Technology, 7(4), 3674-3677. https://doi.org/10.14419/ijet.v7i4.21752