DOI QR코드

DOI QR Code

Combining Encryption and Preservation in Information Security to Secure Sending a Message

  • Nooh, Sameer (Department of Computer Science, Tabuk University)
  • Received : 2022.04.05
  • Published : 2022.04.30

Abstract

With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.

Keywords

References

  1. Hasso, Shahd. Hiding compressed texts in an audio file, Al-Rafidain Journal of Computer Science and Mathematics, Volume (10) Issue (1), (a special issue of the proceedings of the Fifth Scientific Conference in Information Technology). - 2013 .
  2. Kandilji, Amer Ibrahim et al. Information and Communication Networks, Amman: Dar Al Masirah, 2012 .
  3. Hussein, Abdul Amir Khalaf. Encryption Methods for Beginners, Amman: Dar Wael for Publishing and Distribution, 2010.
  4. Al-Hamami, Alaa Hussein and Al-Ani, Saad Abdel-Aziz. Information Security Technology and Protection Systems, Amman: Dar Wael for Publishing and Distribution, 2007.
  5. Abdullah Sadoon Hussein, Steganography Methods and some application (The hidden Secret data in Image) , Mosul : University of Mosul, 2009.
  6. Andrews Chinchu Elza and Joseph Iwin Thanakumar, An analysis of various stegnographic algoritms, International Journal of Advanced Research in Electronics and Communication Engineering (IJAREC) .Volume 2, Issue 2, February 2013.
  7. Felicisimo V. W., Bobby D. G. and Bartolome T. T. Modified AES Algorithm using Multiple S-Boxes". Proceedings of the Second International Conference on Electrical, Electronics, Computer Engineering and their Applications (EECEA) , Manila, Philippine, 2015.
  8. Fouad Mohamed M, Enhancing the Imperceptibility of Image Steganography for Information, The Federated Conference on Computer Science and Information Systems, 2017. - pp. pp. 545-548.
  9. Jeffrey A Bloom, Digital watermarking and steganography, Morgan Kaufmann publications, 2008.
  10. Joye M., Cryptographic Hardware and Embedded Systems-CHES, New York, 2004.
  11. Kevin L., Advanced Encryption Standard (AES) Selection Process- How Rijndael Won, MIDN 1, 2015.
  12. Kobayashi L, Furuie S and Barreto P, Providing Integrity and Authenticity in DICOM Images: A novel Approach, IEEE Transactions on Information Technology in Biomedicine. - 2009. - pp. pp. 582-589.
  13. Koduri Nani, Information Security through Image Steganography Using Least Significant Bit Algorithm, London: University of East London, 2011.
  14. Stallings W., Cryptography and Network Security: Principles and Practice : Prentice Hall, 2013.
  15. Sumathy V. and Navaneethan C., Enhanced AES Algorithm for Strong Encryption, International Journal of Advances in Engineering& Technology (IJAET). - 2012.
  16. Whitman M E and Mattord H J, Principles of information security, Thomson, 2012.
  17. Zinaly Elham and Naghipour Avaz, Audio Steganography to Protect the Confidential Information: A Survey, International Journal of Computer Applications. - July 2017. - pp. 22-29.