Using steganography techniques for implicit authentication to enhance sensitive data hiding

Document Type : Research Paper


Department of Computer Science, College of Science, University of Baghdad, Baghdad, Iraq


Smartphones recently become indispensable to users due to the services provided, like Internet access and important applications (e.g., financial and health applications). which contain personal and confidential information about the user. Consequently, this information is vulnerable to hackers and data privacy violations. This article describes the effective safeguard of sensitive data from different attacks. It's the second level of protection after using implicit authentication. If implicit authentication allows an unauthorized user to access sensitive data, we encrypt it using AES-GCM and hide it under a cover image with LSB Steganography. We noticed that recommended solution is highly effective at data protection while consuming less Memory and being relatively fast. To evaluate the system's efficacy, Peak Signal-to-Noise Ratio(PSNR), Means Square Error(MSE), and Pearson Coefficient Correlation (PCC)are employed as evaluation metrics. Best results are found in sunset image 27KB, with values of MSE (0.005245) and PSNR (70.9547). The (PCC) values are always zero, indicating that there is no relationship between the original text and the encrypted text, implying that the AES-GCM encryption is effective.