DATA STEGANOGRAPHY USING EMBEDDED PRIVATE KEY
Keywords:Embedded Key, LSB2, Covering Image, Holding Image, PK, MSE, PSNR.
LSB2 method of data steganography is one of the most popular methods used to hide secret messages in digital color image. This method keeps the quality of the holding image high but it is not secure and it can be easily hacked.
In this paper a method of improving the security of LSB2 method will be proposed, tested and implemented. The added security issues are simple and do require extra memory and time for execution. An embedded key will be extracted from the holding image to encrypt the message, this key will be variable and depends on the selected covering image, selected message length and selected position in the image where to extract the embedded key; the selected position and message length will form a private key to enhance LSB2 security.
Jamil Al-Azzeh, Ziad Alqadi, Mohammed Abuzalata, Performance Analysis of Artificial Neural Networks used for Color Image Recognition and Retrieving, international Journal of Computer Science and Mobile computing, vol. 8. Issue 2, pp. 20-33, 2-19.
Ziad AlQadi, M Elsayyed Hussein, Window Averaging Method to Create a Feature Victor for RGB Color Image, International Journal of Computer Science and Mobile Computing, vol. 6, issue 2, 2017.
Bilal Zahran Belal Ayyoub, Jihad Nader, Ziad Al-Qadi, Suggested Method to Create Color Image Features Victor, Journal of Engineering and Applied Sciences, vol. 14, issue 1, pp. 2203-2207, 2019.
Majed O Al-Dwairi, Ziad A Alqadi, Amjad A Abujazar, Rushdi Abu Zneit, optimized true-color image processing, World Applied Sciences Journal, vol. 10, issue 8, pp. 1175-1182, 2010.
A. A. Moustafa, Z. A. Alqadi, Color Image Reconstruction Using A New R'G'I Model, journal of Computer Science, Vol.5, No. 4, pp. 250-254, 2009. DOI: https://doi.org/10.3844/jcs.2009.250.254
Jamil Al Azzeh, Hussein Alhatamleh, Ziad A. Alqadi, Mohammad Khalil Abuzalata, creating a Color Map to be used to Convert a Gray Image to Color Image; International Journal of Computer Applications, November 2016, Volume 153, Issue 2. DOI: https://doi.org/10.5120/ijca2016911975
AlQaisi Aws and AlTarawneh Mokhled and Alqadi Ziad A. and Sharadqah Ahmad A, Analysis of Color Image Features Extraction using Texture Methods, TELKOMNIKA, volume 17, number 3, pages1220—1225, year 2019.
Al-Azzeh J., Zahran B., Alqadi Ziad, Ayyoub B. and Abu-Zaher, M., A novel zero-error method to create a secret tag for an image, Journal of Theoretical and Applied Information Technology, volume 96, number13, pages 4081-4091, year 2018.
Amjad Y Hindi, Majed O Dwairi, Ziad A AlQadi, Creating Human Speech Identifier using WPT, International Journal of Computer Science and Mobile Computing, vol. 9, issue 2, pp. 117-123, 2020.
Amjad Hindi, Majed Omar Dwairi, Ziad Alqadi, Analysis of Digital Signals using Wavelet Packet Tree, IJCSMC, vol. 9, issue 2, pp. 96-103, 2020.
Prof. Mohammed Abu Zalata Dr. Ghazi. M. Qaryouti, Dr.Saleh Khawatreh, Prof. Ziad A.A. Alqadi, Optimal Color Image Recognition System (OCIRS), International Journal of Advanced Computer Science and Technology, vol. 7, issue 1, pp. 91-99, 2017.
Dr. Amjad Hindi, Dr. Majed Omar Dwairi, Prof. Ziad Alqadi, Analysis of Procedures used to build an Optimal Fingerprint Recognition System, International Journal of Computer Science and Mobile Computing, vol. 9, issue 2, pp. 21 – 37, 2020.
Prof. Ziad Alqadi Dr. Mohammad S. Khrisat, Prof. Yousif Eltous, Dr. Saleh A. Khawatreh, Dr. Majed Omar Dwairi, Building Face Recognition System (FRS), International Journal of Computer Science and Mobile Computing, vol. 9, issue 6, pp. 15-24, 2020.
AlQaisi Aws, AlTarawneh Mokhled, A Alqadi Ziad, A Sharadqah Ahmad, Analysis of Color Image Features Extraction using Texture Methods, TELKOMNIKA, vol. 17, issue 3, 2018. DOI: https://doi.org/10.12928/telkomnika.v17i3.9922
Ziad Alqadi, Bilal Zahran, Jihad Nader, Estimation and Tuning of FIR Lowpass Digital Filter Parameters, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 7, issue 2, pp. 18-23, 2017. DOI: https://doi.org/10.23956/ijarcsse/V7I2/01209
Musbah Aqel Ziad A. Alqadi, Performance analysis of parallel matrix multiplication algorithms used in image processing, World Applied Sciences Journal, vol. 6, issue 1, pp. 45-52, 2009.
Jamil Al-Azzeh Naseem Asad, Ziad Alqadi, Ismail Shayeb, Qazem Jaber, Simple Procedures to Create HSCS, International Journal of Engineering Research and Management (IJERM), vol. 7, issue 5, pp. 6-10, 2020.
BILAL ZAHRAN, JAMIL AL-AZZEH, ZIAD ALQADI, MOHD–ASHRAF ALZOGHOUL, SALEH KHAWATREH, A MODIFIED LBP METHOD TO EXTRACT FEATURES FROM COLOR IMAGES, Journal of Theoretical and Applied Information Technology, vol. 96, issue 10, pp. 3014-3024, 20, 2018.
Ashraf Abu-Ein, Ziad AA Alqadi, Jihad Nader, A TECHNIQUE OF HIDING SECRETES TEXT IN WAVE FILE, International Journal of Computer Applications, 2016. DOI: https://doi.org/10.5120/ijca2016911732
Rushdi Abu Zneit, Jamil Al-Azzeh, Ziad Alqadi, Belal Ayyoub, Ahmad Sharadqh, Using Color Image as a Stego-Media to Hide Short Secret Messages, IJCSMC, vol. 8, issue 6, pp. 106-123, 2019.
Jamil Al-Azzeh, Ziad Alqadi, Belal Ayyoub, Ahmad Sharadqh, Improving the security of LSB image steganography, JOIV: International Journal on Informatics Visualization, vol. 3, issue 4, pp. 384-387, 2019. DOI: https://doi.org/10.30630/joiv.3.4.233
Belal Ayyoub Ziad Alqadi, Ahmad Sharadqh, Naseem Asad Ismail Shayeb, Jamil Al-Azzeh, A highly secure method of secret message encoding, International Journal of Research in Advanced Engineering and Technology, vol. 5, issue 3, pp. 82-87, 2019.
Ahmad Sharadqh Ziad Alqadi, Bilal Zahran, Qazem Jaber, Belal Ayyoub, Jamil Al-Azzeh, Proposed Implementation Method to Improve LSB Efficiency, International Journal of Computer Science and Mobile Computing, vol. 8, issue 3, pp. 306 – 319, 2019.
Ziad Alqadi, Bilal Zahran, Qazem Jaber, Belal Ayyoub, Jamil Al-Azzeh, Enhancing the Capacity of LSB Method by Introducing LSB2Z Method, International Journal of Computer Science and Mobile Computing, vol. 8, issue 3, pp. 76-90, 2019.
Ziad Alqadi, Bilal Zahran, Qazem Jaber, Belal Ayyoub, Jamil Al-Azzeh, Ahmad Sharadqh, Proposed Implementation Method to Improve LSB Efficiency, International Journal of Computer Science and Mobile Computing, vol. 8, issue 3, pp. 306-319, 2019.
Mohammad S Khrisat, Ziad Alqadi, Saleh A Khawatreh, Improving WPT color image decomposition, International Journal of Computer Science and Information Security (IJCSIS), vol. 12, issue 7, pp. 13-21, 2020.
Prof. Ziad Alqadi, Dr. Mohammad S. Khrisat, two ways to improve WPT decomposition used for image features extraction, European journal for scientific research, vol. 157, issue 2, pp. 195-205, 2020.
Ziad Alqad, Majid Oraiqat, Hisham Almujafet, Salah Al-Saleh, Hind Al Husban, A New Approach for Data Cryptography, International Journal of Computer Science and Mobile Computing, vol. 8, issue 9, pp. 30-48, 2019.
Prof. Ziad Alqadi, Dr. Mohammad S. Khrisat, Dr. Amjad Hindi, Digital color image encryption-decryption using segmentation and reordering, International Journal of Latest Research in Engineering and Technology (IJLRET), vol. 6, issue 5, pp. 6-12, 2020.
Rashad J Rasras, Mohammed Abuzalata, Ziad Alqadi, Jamil Al-Azzeh, Qazem Jaber, Comparative Analysis of Color Image Encryption-Decryption Methods Based on Matrix Manipulation, International Journal of Computer Science and Mobile Computing, vol. 8, issue 3, pp. 14-26, 2019.
How to Cite
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere.
- That its release has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Authors who publish with International Journal of Engineering Technologies and Management Research agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
For More info, please visit CopyRight Section