Enhancement of System Security by Using LSB and RSA Algorithms

Authors

  • Muna M. Hummady Department of Information and Communication Engineering / Al-KhwarIzmi College of Engineering / University of Baghdad/ Iraq
  • Ameer Hussein Morad Department of Information and Communication Engineering / Al-KhwarIzmi College of Engineering / University of Baghdad/ Iraq

DOI:

https://doi.org/10.22153/kej.2022.03.001

Abstract

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

Downloads

Download data is not yet available.

References

M. Gajalakshmi and R. Vidya, “A Review on- Data Hiding using Cryptography and Steganography,” International Journal of Computing Algorithm, vol. 07, Issue: 01, pp. 24-28, June 2018.

Mustafa S. T., Mohd S.M.R., Sameer L., Mohammed M.H., Hassanain M. A., “Combination of Steganography and Cryptography: A short Survey,” 2nd International Conference on Sustainable Engineering Techniques (ICSET), doi:10.1088/1757-899X/518/5/052003, 2019.

Manoj K. R., Dinesh G. and Naveen H., “Data Hiding In Image Using Cryptography And Steganography: An Investigation,” International Journal of Advanced Research in Computer Science, vol. 8, no. 7, pp. 953-956, July – August 2017.

Dheyab Salman Ibrahim, “Enhancing Cloud Computing Security using Cryptography & Steganography,” Iraqi Journal of Information Technology, vol. 9, no. 3, 2019.

Marwa E. Saleh, Abdelmgeid A. Aly, Fatma A. Omara, “Data Security Using Cryptography and Steganography Techniques,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, no. 6, pp. 390-397, 2016.

Shambhavi U. Burge, Nitin A. Sawant, Swapnil D. Choudhari, Priyanka A. Sonkusare, “Secure Data Hiding using Cryptography and LSB Techniques,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 4, Issue 10, pp. 3863-3870, Oct. 2015.

Ameer H. Morad, Hatem Nahi Mohaisen, “Secret Message Hiding Randomly In Video,” International Journal of Advancements in Computing Technology (IJACT), vol. 8, no. 3, June 2016.

Hatem Nahi Mohaisen, Ameer H. Morad, “Secure Information Using Steganography and Watermarking,” Iraqi Journal of Science, vol. Special Issue Part-A, pp. 112-128, 2016.

Mustafa S. Taha, et al, “Combination of Steganography and Cryptography: A short Survey,” 2nd International Conference on Sustainable Engineering Techniques (ICSET), appear in IOP Conf. Series: Materials Science and Engineering 518, 2019.

Shireen Nisha, Mohammed Farik, “RSA Public Key Cryptography Algorithm – A Review,” International Journal of Scientific & Technology Research, vol. 6, issue 07, pp. 187-191, July 2017.

Dindayal Mahto, Dilip Kumar Yadav, “Performance Analysis of RSA and Elliptic Curve Cryptography,” International Journal of Network Security, vol. 20, no. 4, pp. 625-635, July 2018.

Divya.A1, S.Thenmozhi, “Steganography: Various Techniques In Spatial and Transform Domain,” International Journal of Advanced Scientific Research and Management, vol. 1, issue 3, March 2016.

Ammar Awad, “A Survey of Spatial Domain Techniques in Image Steganography,” Journal of Education College Wasit University, vol. 26, Jan. 2018.

Marwa M. Emam, Abdelmgeid A. Aly, andFatma A. Omara, “An Improved Image Steganography Method Based on LSB Technique with Random Pixel Selection,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, no. 3, pp. 361-366, 2016

Harpreet Kaur and Jyoti Rani, “A Survey on different techniques of steganography,” MATEC Web of Conferences, doi: 10.1051/ 57, 02003, 2016.

S. Udhayavene∗, Aathira T. Dev and K. Chandrasekaran, “New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length),” Procedia Computer Science 54, pp. 790 – 798, 2015.

Yifeng Sun, Fenlin Liu, “Selecting Cover for Image Steganography by Correlation Coefficient,” 2010 Second International Workshop on Education Technology and Computer Science, 2010.

Anita Pradhan, et al., “Performance evaluation parameters of image steganography techniques,” International Conference Research Advances in Integrated Navigation Systems (RAINS), 2016.

S. Tanako, K. Tanaka and T. Sugimura, “Data Hiding via Steganographic Image Transformation,” IEICE Trans. Fundamentals, vol. E83-A, pp. 311-319, Feb. 2000.

Haripriya Rout, Brojo Kishore Mishra, “Pros and Cons of Cryptography, Steganography and Perturbation techniques,” IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), e-ISSN: 2278-2834, p.p. 76-81.

Downloads

Published

2022-03-19

How to Cite

Enhancement of System Security by Using LSB and RSA Algorithms. (2022). Al-Khwarizmi Engineering Journal, 18(1), 26-37. https://doi.org/10.22153/kej.2022.03.001

Publication Dates