
تعداد نشریات | 21 |
تعداد شمارهها | 610 |
تعداد مقالات | 9,028 |
تعداد مشاهده مقاله | 67,082,898 |
تعداد دریافت فایل اصل مقاله | 7,656,365 |
Application of modify RSA cryptography and randomly LSB steganography on color images of fluid flow in a channel | ||
International Journal of Nonlinear Analysis and Applications | ||
دوره 12، شماره 2، بهمن 2021، صفحه 1725-1734 اصل مقاله (989.6 K) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22075/ijnaa.2021.5312 | ||
نویسندگان | ||
Hatem Nahi Mohaisen* 1؛ Awad Kadhim Hammoud2 | ||
1Ministry of High Education and Scientific Research, Applied Mathematics, Baghdad, Iraq | ||
2Univesity of Information Technology and Communication, Baghdad, Iraq | ||
تاریخ دریافت: 21 بهمن 1399، تاریخ بازنگری: 02 خرداد 1400، تاریخ پذیرش: 22 خرداد 1400 | ||
چکیده | ||
This paper introduces a combination of three methods including a modified RSA cryptography, hidden text using steganography, and selection of random pixel from image to improve the general security level of the system. In this regard, the image is a carrier of the information transmitted through the media, and the fluid motion image is used to hide the information after it was encoded using modify RSA technique that before hiding it in a random way, because the image of fluid motion possesses the sinusoidal waves and turbulent motion. In this paper, a combination of three techniques is utilized in order to prevent the intruders and attackers from detecting the information and sharing it with others. LSB technique is used for hiding the message in image-based steganography. In addition, pseudo number to choose the random number of pixel when hiding the message after encryption. Four measures including Peak Signal to Noise Ratio (PSNR), Mean Squared Error (MSE), Structural Similarity Index Measure (SSIM), and histogram are used to compare the original image and stego-image. The results demonstrated the outperformance of the proposed method so that neither the attacker nor the intruder could discover the information contained within the image, due to the large value of the PSNR, very small value of the MSE, stability of the SSIM, and matching the histograms. | ||
کلیدواژهها | ||
Steganography؛ PSNR؛ MSE؛ SSIM؛ Information hiding؛ Modified RSA cryptography؛ Seed number؛ Histogram | ||
مراجع | ||
[1] K. A. Al-Afandy, O. S. Faragallah, A. Elmhalawy, E. S. M. El- Rabaie and G. M. El-Banby, High security data hiding using image cropping and LSB least significant bit steganography, Colloq. Inf. Sci. Tech. (2017) 400–404. [2] Sh. M. Abo Mousa, LSBs steganography based on R-Indicator, M.Sc. Thesis, Faculity of Information Technology, the Islamic University-Gaza, 2017. [3] M. O. Alsadeg Ali, Visual cryptography scheme for color images using Arnold mapping and modified RSA algorithm, M.Sc. Thesis, Sudan University of Science and Technology, 2018. [4] Q. S. Alsaffar, H. N. Mohaisen and F. N. Almashhdini, An encryption based on DNA and AES algorithms for hiding a compressed text in colored Image, IOP Conf. Series Materials Sci. Engin. 1058(1) (2021) 012048. [5] S. O. Alsharkasi, M. M. Elsheh and F. O. Ehtiba, Evaluation of using steganography technique to hide a text in grayscale digital images, J. Acad. Res. Appl. Sci. 19 (2021) 1–6. [6] Ambika, R. L. Biradar, V. Burkpalli, Efficient approach for steganography using DWT and RSA algorithm, Int. J. Engin. Adv. Tech. 8(5)(2019) 1435–1443. [7] S. Asjad, RSA Algorithm, University of South-Eastern Norway Campus Kongsberg, (2019). [8] B. Chitradevi, N. Thinaharan and M. Vasanthi, Data hiding using least significant bit steganography in digital images, Statistical Approaches on Multidisciplinary Research, 2017. [9] M. Evans, RSA Encryption, Australian Mathematical Sciences Institute (AMSI), 2013. [10] R. Halder, S. Sengupta, S. Ghosh and D. Kundu, A secure image steganography based on RSA algorithm and hash-LSB technique, IOSR J. of Comput. Engin. 18(1) (2016) 39–43. [11] M. Juneja and P. S. Sandhu, An improved LSB based steganography technique for RGB color images, Int. J. Comput. Commun. Engin. 2(4) (2013) 513–517. [12] F. Koeune, Pseudo-Random Number Generator, In: H. C. A. van Tilborg (eds) Encyclopedia of Cryptography and Security Springer, Boston, MA, 2005. [13] K. Kordov and S. Zhelezov, Steganography in color images with random order of pixel selection and encrypted text message embedding, Peer J. Comput. Sci. 7 (2021) e380. [14] D. Lehmer, Mathematical methods in large-scale computing units, In: U. S. N. D. B. o. Ordnance and H. University (eds) Proceedings of the second symposium on large-scale digital computing machinery, Harvard University, 1951, 141–146. [15] L. Li, B. Luo, Q. Li and X. Fang, A color images steganography method by multiple embedding strategy based on sobel operator, 1st Int. Conf. Mult. Inf. Network. Secur. 2(1) (2009) 118–121. [16] R. Lin and SH. Li, An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm, Secur. Commun. Networks (Hindawi), 2021 (2021).[17] S. Manaseer, A. Aljawawdeh and D. Alsoudi, A new image steganography depending on reference and LSB, Int. J. Appl. Engin. Res. 12(9) (2017) 1950–1955. [18] S. Majumder and M. M. Rahman, Implementation of security enhanced image steganography with the incorporation of modified RSA algorithm, Int. Conf. Elect. Comput. Commun. Engin. (2019) 1–5. [19] H.N. Mohaisen, Secure data hiding technique using steganography and watermarking, M.SC. Thesis, College of Science, Baghdad University, 2016. [20] S.A. Naji, H.N. Mohaisen, Q.S. Alsaffar and H.A. Jalab, Automatic region selection method to enhance imagebased steganography, Period. Engin. Natural Sci. 8(1) (2020) 67–78. [21] M. E. Saleh, A. A. Aly and F. A. Omara, Data security using cryptography and steganography techniques, Int. J. Adv. Comput. Sci. Appl. 7(6) (2016) 390–397. [22] Y. M. Wazery, S.G. Haridy and A.A. Ali, A hybrid technique based on RSA and data hiding for securing handwritten signature, Int. J. Adv. Comput. Sci. Appl. 12(4) (2021). [23] G. Ye, H. Wu, K. Jiao and D. Mei, Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion, Math. Biosci. Engin. 18(5) (2021) 5427–5448. | ||
آمار تعداد مشاهده مقاله: 15,765 تعداد دریافت فایل اصل مقاله: 515 |