Hiding Encrypted Text in Image using Least Significant Bit image Steganography Technique

Authors

  • Zahraa Salah Dhaief Mustansiriyah University , College of Education, Iraq
  • Raniah Ali Mustafa Mustansiriyah University, College of Education, Iraq
  • Amal Abdulbaqi Maryoosh Mustansiriyah University , College of Education, Iraq

DOI:

https://doi.org/10.31695/IJERAT.2020.3642

Keywords:

Cryptography, Steganography, Chaotic map, Least Significant Bit, Digital image

Abstract

Today, in this new era of the internet, Information Security is becoming the biggest challenge for the world due to the rapid growth of internet users day by day. Unauthorized access to secret data can have serious repercussions like a financial loss. One of the best techniques for secure communication is Steganography-or covert writing. It is an art of hiding the very existence of communicating the message itself. This research presents a state of dual stenographic technique. Dual Steganography combines two security mechanisms, steganography and cryptography both together. This mechanism has the advantage of providing high security and low time complexity. This research proposes a dual steganography technique with an additional level of security. The proposed algorithm embeds secret text messages in cover image in two phases. The two phases include a chaotic map cipher technique for encrypting text and LSB (Least Significant Bit) image steganography technique for hiding encrypted text in an image. The text containing encrypted data is hidden in an RGB image.

References

Ikhlas Falih Alsudany. ( 2006).Analysis and Detection of Information Hiding in Digital Images, M.Sc, University of Technology, Department of Computer Science.

Anupam Mondal and Shiladitya Pujari.( 2015).A Novel Approach of Image Based Steganography Using Pseudorandom Sequence Generator Function and DCT Coefficients, Computer Network and Information Security, MECS, 3, pp.42-49.

Christof Paar and Jan Pelzl.(2010).Understanding Cryptography, A Textbook for Students and Practitioners, Foreword by Bart Preneel, Springer-Verlag Berlin Heidelberg.

Charles P. Pfleeger.(October 13, 2006). Security in Computing, 4th Edition, Prentice Hall.

Gary C. Kessler. (17 November 2006).An Overview of Cryptography, Available at: http://www.cs.princeton.edu/~chazelle/courses/BIB/overview-crypto.pdf.

Richard A. Mollin.( 2007). An Introduction to Cryptography, 2nd Edition, Chapman & Hall/CRC.

Michael E. Whitman and Herbert J. Mattord,( 2011). Principles of Information Security, 4th Edition, Course Technology.

B. Rajan.( 2011). Independent Domain of Symmetric Encryption using Least Significant Bit , M.Sc. Thesis, University of Dalarna, Computer Engineering.

Najla'a Abd Hamza Muhsassan.(2005). New Robust Information HidingTechnique, Msc. University of Technology, Informatics Institute for Postgraduate Studies,.

Morkel, T., Eloff, J. H., & Olivier. M. S. (2014, June). An overview of image Steganography. In Information Systems Security Association(ISSA), pp. 1-11.

Sura Fahmy Yousif.( 2014). Wavelet Based Image Stenographic System using Chaotic Signals, Msc. AL-Mustansiriya University, College of Engineering.

TU Tran.( 2002). steganography the art of hiding data. Mills College.

Rafael C. Gonzalez and Richard E. Woods.( 2007). Digital Image Processing, 3rd Edition, Prentice Hall.

Ze-Nian Li, Mark S. Drew and Jiangchuan Liu.( 2014).Fundamentals of Multimedia, Springer International Publishing Switzerland, 2nd Edition.

Alasdair McAndrew.( 2004). An Introduction to Digital Image Processing with Matlab, Course Technology.

Pianhui Wu.( May 2013). Research on Digital Image Watermark Encryption Based on Hyper Chaos, Faculty of Business, Computing and Law, University of Derby.

Mahmoud Maqableh.( 8, December 2015) A Novel Triangular Chaotic Map (TCM) with Full Intensive Chaotic Population Based on Logistic Map, Journal of Software Engineering and Applications.

Chong Fu et al., (, 2014).A Symmetric Chaos-Based Image Cipher with an Improved Bit-Level Permutation Strategy, Entropy, 16.

Downloads

Published

2020-08-20

Issue

Section

Articles

How to Cite

Hiding Encrypted Text in Image using Least Significant Bit image Steganography Technique. (2020). International Journal of Engineering Research and Advanced Technology (ijerat) (E-ISSN 2454-6135) , 6(8), 63-75. https://doi.org/10.31695/IJERAT.2020.3642