Application of modify RSA cryptography and randomly LSB steganography on color images of fluid flow in a channel

Document Type : Research Paper


1 Ministry of High Education and Scientific Research, Applied Mathematics, Baghdad, Iraq

2 Univesity of Information Technology and Communication, Baghdad, Iraq


This paper introduces a combination of three methods including a modified RSA cryptography, hidden text using steganography, and selection of random pixel from image to improve the general security level of the system. In this regard, the image is a carrier of the information transmitted through the media, and the fluid motion image is used to hide the information after it was encoded using modify RSA technique that before hiding it in a random way, because the image of fluid motion possesses the sinusoidal waves and turbulent motion.  In this paper, a combination of three techniques is utilized in order to prevent the intruders and attackers from detecting the information and sharing it with others. LSB technique is used for hiding the message in image-based steganography. In addition, pseudo number to choose the random number of pixel when hiding the message after encryption. Four measures including Peak Signal to Noise Ratio (PSNR), Mean Squared Error (MSE), Structural Similarity Index Measure (SSIM), and histogram are used to compare the original image and stego-image. The results demonstrated the outperformance of the proposed method so that neither the attacker nor the intruder could discover the information contained within the image, due to the large value of the PSNR, very small value of the MSE, stability of the SSIM, and matching the histograms.


[1] K. A. Al-Afandy, O. S. Faragallah, A. Elmhalawy, E. S. M. El- Rabaie and G. M. El-Banby, High security data
hiding using image cropping and LSB least significant bit steganography, Colloq. Inf. Sci. Tech. (2017) 400–404.
[2] Sh. M. Abo Mousa, LSBs steganography based on R-Indicator, M.Sc. Thesis, Faculity of Information Technology,
the Islamic University-Gaza, 2017.
[3] M. O. Alsadeg Ali, Visual cryptography scheme for color images using Arnold mapping and modified RSA algorithm, M.Sc. Thesis, Sudan University of Science and Technology, 2018.
[4] Q. S. Alsaffar, H. N. Mohaisen and F. N. Almashhdini, An encryption based on DNA and AES algorithms for
hiding a compressed text in colored Image, IOP Conf. Series Materials Sci. Engin. 1058(1) (2021) 012048.
[5] S. O. Alsharkasi, M. M. Elsheh and F. O. Ehtiba, Evaluation of using steganography technique to hide a text in
grayscale digital images, J. Acad. Res. Appl. Sci. 19 (2021) 1–6.
[6] Ambika, R. L. Biradar, V. Burkpalli, Efficient approach for steganography using DWT and RSA algorithm, Int.
J. Engin. Adv. Tech. 8(5)(2019) 1435–1443.
[7] S. Asjad, RSA Algorithm, University of South-Eastern Norway Campus Kongsberg, (2019).
[8] B. Chitradevi, N. Thinaharan and M. Vasanthi, Data hiding using least significant bit steganography in digital
images, Statistical Approaches on Multidisciplinary Research, 2017.
[9] M. Evans, RSA Encryption, Australian Mathematical Sciences Institute (AMSI), 2013.
[10] R. Halder, S. Sengupta, S. Ghosh and D. Kundu, A secure image steganography based on RSA algorithm and
hash-LSB technique, IOSR J. of Comput. Engin. 18(1) (2016) 39–43.
[11] M. Juneja and P. S. Sandhu, An improved LSB based steganography technique for RGB color images, Int. J.
Comput. Commun. Engin. 2(4) (2013) 513–517.
[12] F. Koeune, Pseudo-Random Number Generator, In: H. C. A. van Tilborg (eds) Encyclopedia of Cryptography
and Security Springer, Boston, MA, 2005.
[13] K. Kordov and S. Zhelezov, Steganography in color images with random order of pixel selection and encrypted
text message embedding, Peer J. Comput. Sci. 7 (2021) e380.
[14] D. Lehmer, Mathematical methods in large-scale computing units, In: U. S. N. D. B. o. Ordnance and H. University
(eds) Proceedings of the second symposium on large-scale digital computing machinery, Harvard University, 1951,
[15] L. Li, B. Luo, Q. Li and X. Fang, A color images steganography method by multiple embedding strategy based on
sobel operator, 1st Int. Conf. Mult. Inf. Network. Secur. 2(1) (2009) 118–121.
[16] R. Lin and SH. Li, An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm, Secur.
Commun. Networks (Hindawi), 2021 (2021).[17] S. Manaseer, A. Aljawawdeh and D. Alsoudi, A new image steganography depending on reference and LSB, Int.
J. Appl. Engin. Res. 12(9) (2017) 1950–1955.
[18] S. Majumder and M. M. Rahman, Implementation of security enhanced image steganography with the incorporation of modified RSA algorithm, Int. Conf. Elect. Comput. Commun. Engin. (2019) 1–5.
[19] H.N. Mohaisen, Secure data hiding technique using steganography and watermarking, M.SC. Thesis, College of
Science, Baghdad University, 2016.
[20] S.A. Naji, H.N. Mohaisen, Q.S. Alsaffar and H.A. Jalab, Automatic region selection method to enhance imagebased steganography, Period. Engin. Natural Sci. 8(1) (2020) 67–78.
[21] M. E. Saleh, A. A. Aly and F. A. Omara, Data security using cryptography and steganography techniques, Int. J.
Adv. Comput. Sci. Appl. 7(6) (2016) 390–397.
[22] Y. M. Wazery, S.G. Haridy and A.A. Ali, A hybrid technique based on RSA and data hiding for securing handwritten signature, Int. J. Adv. Comput. Sci. Appl. 12(4) (2021).
[23] G. Ye, H. Wu, K. Jiao and D. Mei, Asymmetric image encryption scheme based on the Quantum logistic map
and cyclic modulo diffusion, Math. Biosci. Engin. 18(5) (2021) 5427–5448.
Volume 12, Issue 2
November 2021
Pages 1725-1734
  • Receive Date: 09 February 2021
  • Revise Date: 23 May 2021
  • Accept Date: 12 June 2021