DATA STEGANOGRAPHY USING EMBEDDED PRIVATE KEY

  • N Prof. Ziad Alqadi Department of computer engineering, Faculty of engineering technology, Al-Balqa Applied University, Jordan
  • Dr. Mohammad S. Khrisat Computer Engineering, Albalqa Applied University, Jordan
Keywords: Embedded Key, LSB2, Covering Image, Holding Image, PK, MSE, PSNR.

Abstract

LSB2 method of data steganography is one of the most popular methods used to hide secret messages in digital color image. This method keeps the quality of the holding image high but it is not secure and it can be easily hacked.

In this paper a method of improving the security of LSB2 method will be proposed, tested and implemented. The added security issues are simple and do require extra memory and time for execution.  An embedded key will be extracted from the holding image to encrypt the message, this key will be variable and depends on the selected covering image, selected message length and selected position in the image where to extract the embedded key; the selected position and message length will form a private key to enhance LSB2 security.

Downloads

Download data is not yet available.

References

Jamil Al-Azzeh, Ziad Alqadi, Mohammed Abuzalata, Performance Analysis of Artificial Neural Networks used for Color Image Recognition and Retrieving, international Journal of Computer Science and Mobile computing, vol. 8. Issue 2, pp. 20-33, 2-19.

Ziad AlQadi, M Elsayyed Hussein, Window Averaging Method to Create a Feature Victor for RGB Color Image, International Journal of Computer Science and Mobile Computing, vol. 6, issue 2, 2017.

Bilal Zahran Belal Ayyoub, Jihad Nader, Ziad Al-Qadi, Suggested Method to Create Color Image Features Victor, Journal of Engineering and Applied Sciences, vol. 14, issue 1, pp. 2203-2207, 2019.

Majed O Al-Dwairi, Ziad A Alqadi, Amjad A Abujazar, Rushdi Abu Zneit, optimized true-color image processing, World Applied Sciences Journal, vol. 10, issue 8, pp. 1175-1182, 2010.

A. A. Moustafa, Z. A. Alqadi, Color Image Reconstruction Using A New R'G'I Model, journal of Computer Science, Vol.5, No. 4, pp. 250-254, 2009. DOI: https://doi.org/10.3844/jcs.2009.250.254

Jamil Al Azzeh, Hussein Alhatamleh, Ziad A. Alqadi, Mohammad Khalil Abuzalata, creating a Color Map to be used to Convert a Gray Image to Color Image; International Journal of Computer Applications, November 2016, Volume 153, Issue 2. DOI: https://doi.org/10.5120/ijca2016911975

AlQaisi Aws and AlTarawneh Mokhled and Alqadi Ziad A. and Sharadqah Ahmad A, Analysis of Color Image Features Extraction using Texture Methods, TELKOMNIKA, volume 17, number 3, pages1220—1225, year 2019.

Al-Azzeh J., Zahran B., Alqadi Ziad, Ayyoub B. and Abu-Zaher, M., A novel zero-error method to create a secret tag for an image, Journal of Theoretical and Applied Information Technology, volume 96, number13, pages 4081-4091, year 2018.

Amjad Y Hindi, Majed O Dwairi, Ziad A AlQadi, Creating Human Speech Identifier using WPT, International Journal of Computer Science and Mobile Computing, vol. 9, issue 2, pp. 117-123, 2020.

Amjad Hindi, Majed Omar Dwairi, Ziad Alqadi, Analysis of Digital Signals using Wavelet Packet Tree, IJCSMC, vol. 9, issue 2, pp. 96-103, 2020.

Prof. Mohammed Abu Zalata Dr. Ghazi. M. Qaryouti, Dr.Saleh Khawatreh, Prof. Ziad A.A. Alqadi, Optimal Color Image Recognition System (OCIRS), International Journal of Advanced Computer Science and Technology, vol. 7, issue 1, pp. 91-99, 2017.

Dr. Amjad Hindi, Dr. Majed Omar Dwairi, Prof. Ziad Alqadi, Analysis of Procedures used to build an Optimal Fingerprint Recognition System, International Journal of Computer Science and Mobile Computing, vol. 9, issue 2, pp. 21 – 37, 2020.

Prof. Ziad Alqadi Dr. Mohammad S. Khrisat, Prof. Yousif Eltous, Dr. Saleh A. Khawatreh, Dr. Majed Omar Dwairi, Building Face Recognition System (FRS), International Journal of Computer Science and Mobile Computing, vol. 9, issue 6, pp. 15-24, 2020.

AlQaisi Aws, AlTarawneh Mokhled, A Alqadi Ziad, A Sharadqah Ahmad, Analysis of Color Image Features Extraction using Texture Methods, TELKOMNIKA, vol. 17, issue 3, 2018. DOI: https://doi.org/10.12928/telkomnika.v17i3.9922

Ziad Alqadi, Bilal Zahran, Jihad Nader, Estimation and Tuning of FIR Lowpass Digital Filter Parameters, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 7, issue 2, pp. 18-23, 2017. DOI: https://doi.org/10.23956/ijarcsse/V7I2/01209

Musbah Aqel Ziad A. Alqadi, Performance analysis of parallel matrix multiplication algorithms used in image processing, World Applied Sciences Journal, vol. 6, issue 1, pp. 45-52, 2009.

Jamil Al-Azzeh Naseem Asad, Ziad Alqadi, Ismail Shayeb, Qazem Jaber, Simple Procedures to Create HSCS, International Journal of Engineering Research and Management (IJERM), vol. 7, issue 5, pp. 6-10, 2020.

BILAL ZAHRAN, JAMIL AL-AZZEH, ZIAD ALQADI, MOHD–ASHRAF ALZOGHOUL, SALEH KHAWATREH, A MODIFIED LBP METHOD TO EXTRACT FEATURES FROM COLOR IMAGES, Journal of Theoretical and Applied Information Technology, vol. 96, issue 10, pp. 3014-3024, 20, 2018.

Ashraf Abu-Ein, Ziad AA Alqadi, Jihad Nader, A TECHNIQUE OF HIDING SECRETES TEXT IN WAVE FILE, International Journal of Computer Applications, 2016. DOI: https://doi.org/10.5120/ijca2016911732

Rushdi Abu Zneit, Jamil Al-Azzeh, Ziad Alqadi, Belal Ayyoub, Ahmad Sharadqh, Using Color Image as a Stego-Media to Hide Short Secret Messages, IJCSMC, vol. 8, issue 6, pp. 106-123, 2019.

Jamil Al-Azzeh, Ziad Alqadi, Belal Ayyoub, Ahmad Sharadqh, Improving the security of LSB image steganography, JOIV: International Journal on Informatics Visualization, vol. 3, issue 4, pp. 384-387, 2019. DOI: https://doi.org/10.30630/joiv.3.4.233

Belal Ayyoub Ziad Alqadi, Ahmad Sharadqh, Naseem Asad Ismail Shayeb, Jamil Al-Azzeh, A highly secure method of secret message encoding, International Journal of Research in Advanced Engineering and Technology, vol. 5, issue 3, pp. 82-87, 2019.

Ahmad Sharadqh Ziad Alqadi, Bilal Zahran, Qazem Jaber, Belal Ayyoub, Jamil Al-Azzeh, Proposed Implementation Method to Improve LSB Efficiency, International Journal of Computer Science and Mobile Computing, vol. 8, issue 3, pp. 306 – 319, 2019.

Ziad Alqadi, Bilal Zahran, Qazem Jaber, Belal Ayyoub, Jamil Al-Azzeh, Enhancing the Capacity of LSB Method by Introducing LSB2Z Method, International Journal of Computer Science and Mobile Computing, vol. 8, issue 3, pp. 76-90, 2019.

Ziad Alqadi, Bilal Zahran, Qazem Jaber, Belal Ayyoub, Jamil Al-Azzeh, Ahmad Sharadqh, Proposed Implementation Method to Improve LSB Efficiency, International Journal of Computer Science and Mobile Computing, vol. 8, issue 3, pp. 306-319, 2019.

Mohammad S Khrisat, Ziad Alqadi, Saleh A Khawatreh, Improving WPT color image decomposition, International Journal of Computer Science and Information Security (IJCSIS), vol. 12, issue 7, pp. 13-21, 2020.

Prof. Ziad Alqadi, Dr. Mohammad S. Khrisat, two ways to improve WPT decomposition used for image features extraction, European journal for scientific research, vol. 157, issue 2, pp. 195-205, 2020.

Ziad Alqad, Majid Oraiqat, Hisham Almujafet, Salah Al-Saleh, Hind Al Husban, A New Approach for Data Cryptography, International Journal of Computer Science and Mobile Computing, vol. 8, issue 9, pp. 30-48, 2019.

Prof. Ziad Alqadi, Dr. Mohammad S. Khrisat, Dr. Amjad Hindi, Digital color image encryption-decryption using segmentation and reordering, International Journal of Latest Research in Engineering and Technology (IJLRET), vol. 6, issue 5, pp. 6-12, 2020.

Rashad J Rasras, Mohammed Abuzalata, Ziad Alqadi, Jamil Al-Azzeh, Qazem Jaber, Comparative Analysis of Color Image Encryption-Decryption Methods Based on Matrix Manipulation, International Journal of Computer Science and Mobile Computing, vol. 8, issue 3, pp. 14-26, 2019.

Published
2020-09-21
How to Cite
Alqadi , Z., & Khrisat, M. S. (2020). DATA STEGANOGRAPHY USING EMBEDDED PRIVATE KEY. International Journal of Engineering Technologies and Management Research, 7(9), 31-38. https://doi.org/10.29121/ijetmr.v7.i9.2020.782