الملخص
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
المراجع
M. Gajalakshmi and R. Vidya, “A Review on- Data Hiding using Cryptography and Steganography,” International Journal of Computing Algorithm, vol. 07, Issue: 01, pp. 24-28, June 2018.
Mustafa S. T., Mohd S.M.R., Sameer L., Mohammed M.H., Hassanain M. A., “Combination of Steganography and Cryptography: A short Survey,” 2nd International Conference on Sustainable Engineering Techniques (ICSET), doi:10.1088/1757-899X/518/5/052003, 2019.
Manoj K. R., Dinesh G. and Naveen H., “Data Hiding In Image Using Cryptography And Steganography: An Investigation,” International Journal of Advanced Research in Computer Science, vol. 8, no. 7, pp. 953-956, July – August 2017.
Dheyab Salman Ibrahim, “Enhancing Cloud Computing Security using Cryptography & Steganography,” Iraqi Journal of Information Technology, vol. 9, no. 3, 2019.
Marwa E. Saleh, Abdelmgeid A. Aly, Fatma A. Omara, “Data Security Using Cryptography and Steganography Techniques,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, no. 6, pp. 390-397, 2016.
Shambhavi U. Burge, Nitin A. Sawant, Swapnil D. Choudhari, Priyanka A. Sonkusare, “Secure Data Hiding using Cryptography and LSB Techniques,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 4, Issue 10, pp. 3863-3870, Oct. 2015.
Ameer H. Morad, Hatem Nahi Mohaisen, “Secret Message Hiding Randomly In Video,” International Journal of Advancements in Computing Technology (IJACT), vol. 8, no. 3, June 2016.
Hatem Nahi Mohaisen, Ameer H. Morad, “Secure Information Using Steganography and Watermarking,” Iraqi Journal of Science, vol. Special Issue Part-A, pp. 112-128, 2016.
Mustafa S. Taha, et al, “Combination of Steganography and Cryptography: A short Survey,” 2nd International Conference on Sustainable Engineering Techniques (ICSET), appear in IOP Conf. Series: Materials Science and Engineering 518, 2019.
Shireen Nisha, Mohammed Farik, “RSA Public Key Cryptography Algorithm – A Review,” International Journal of Scientific & Technology Research, vol. 6, issue 07, pp. 187-191, July 2017.
Dindayal Mahto, Dilip Kumar Yadav, “Performance Analysis of RSA and Elliptic Curve Cryptography,” International Journal of Network Security, vol. 20, no. 4, pp. 625-635, July 2018.
Divya.A1, S.Thenmozhi, “Steganography: Various Techniques In Spatial and Transform Domain,” International Journal of Advanced Scientific Research and Management, vol. 1, issue 3, March 2016.
Ammar Awad, “A Survey of Spatial Domain Techniques in Image Steganography,” Journal of Education College Wasit University, vol. 26, Jan. 2018.
Marwa M. Emam, Abdelmgeid A. Aly, andFatma A. Omara, “An Improved Image Steganography Method Based on LSB Technique with Random Pixel Selection,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, no. 3, pp. 361-366, 2016
Harpreet Kaur and Jyoti Rani, “A Survey on different techniques of steganography,” MATEC Web of Conferences, doi: 10.1051/ 57, 02003, 2016.
S. Udhayavene∗, Aathira T. Dev and K. Chandrasekaran, “New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length),” Procedia Computer Science 54, pp. 790 – 798, 2015.
Yifeng Sun, Fenlin Liu, “Selecting Cover for Image Steganography by Correlation Coefficient,” 2010 Second International Workshop on Education Technology and Computer Science, 2010.
Anita Pradhan, et al., “Performance evaluation parameters of image steganography techniques,” International Conference Research Advances in Integrated Navigation Systems (RAINS), 2016.
S. Tanako, K. Tanaka and T. Sugimura, “Data Hiding via Steganographic Image Transformation,” IEICE Trans. Fundamentals, vol. E83-A, pp. 311-319, Feb. 2000.
Haripriya Rout, Brojo Kishore Mishra, “Pros and Cons of Cryptography, Steganography and Perturbation techniques,” IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), e-ISSN: 2278-2834, p.p. 76-81.
حقوق الطبع والنشر: يحتفظ مؤلفو الوصول المفتوح بحقوق الطبع والنشر لاعمالهم، ويتم توزيع جميع مقالات الوصول المفتوح بموجب شروط ترخيص Creative Commons Attribution License، والتي تسمح بالاستخدام غير المقيد والتوزيع والاستنساخ في أي وسيط، بشرط ذكر العمل الأصلي بشكل صحيح. إن استخدام الأسماء الوصفیة العامة، والأسماء التجاریة، والعلامات التجاریة، وما إلی ذلك في ھذا المنشور، حتی وإن لم یتم تحدیدھ بشکل محدد، لا یعني أن ھذه الأسماء غیر محمیة بموجب القوانین واللوائح ذات الصلة. في حين يعتقد أن المشورة والمعلومات في هذه المجلة صحيحة ودقيقة في تاريخ صحتها، لا يمكن للمؤلفين والمحررين ولا الناشر قبول أي مسؤولية قانونية عن أي أخطاء أو سهو قد يتم. لا يقدم الناشر أي ضمان، صريح أو ضمني، فيما يتعلق بالمواد الواردة في هذه الوثيقة.