Using LU analysis to encryption the images formed after steganography of image into another image

Document Type : Research Paper


1 Department of Mathematics, Faculty of Basic Education, University of Kufa, Iraq

2 Department of Mathematics, Faculty of Computer science and mathematics, University of Kufa, Najaf, Iraq


In this research, we will hide an image we call the secret image inside another image we call the repository. After converting the color values of both images from decimal to binary, we copy the stored images into four copies and use the eighth and seventh bits of these copies to hide the full bits of the secret image starting with the first. Two to be replaced in the eighth and seventh parts, respectively in the first version, then we hide the third and  fourth bits of the secret image in the eighth and seventh parts, respectively, of the second version of the repository images, after that we hide the fourth and fifth parts of the secret image in the eighth and seventh parts of The third version of the repository image, then finally we put the last two bits of the secret image in the eighth and seventh parts of the fourth version of the image After that, we retrieve the color values of the images formed  from the binary system to the decimal system so that we have four new warehouse images, but the secret image that did not show any features in the images  roduced in order to strengthen the masking process, we encrypt those formed images using one of the mathematical analyzes within the field of analysis Numerical, which is the analysis of LU factors, which analyzes the image or divides it into two images, and we will see this through the working methodology.


[1] M. Alasdair, An introduction to digital image processing with Matlab, Course Technology, 2004.
[2] M.A.F. Al-Husainy and D.M. Uliyan, Image steganography technique based on extracted chains from the secret key, J. Engin. Appl. Sci. 13 (2018), 4235–4244.
[3] S. Almuhammadi and A. Al-Shaaby, A survey on recent approaches combining cryptography and steganography Computer Science, Information Technology (CS IT), 2017.
[4] K.I. Al-Saif and A.S. Abdullah, Color image enhancement based on contourlet transform coefficients, Aust. J. Basic Appl. Sci. 7 (2013), no. 8, 207–213.
[5] P. Anita, Numerical analysis, National Institute of Technology Durgapur, Durgapur-713209.
[6] S. Adjerid, Notes for numerical analysis, Math 4445, Virginia Polytechnic Institute and State University. 
[7] T.S. Barhoom and S.M. AMousa, A steganography lsb technique for hiding image within image using blowfish encryption algorithm, Int. J. Res. Eng. Sci. 3 (2015), 61–66.
[8] M. Douglas, K. Bailey, M. Leeney and K. Curran, An overview of steganography techniques applied to the protection of biometric data, Multi.Tools Appl. 77 (2018), 17333–17373.
[9] D. Gollmann, Computer security Wiley interdisciplinary reviews, Comput. Statist. 2 (2010), 544–554.
[10] M.M. Hashim, M.S.M. Rahim, F.A. Johi, M.S. Taha, A.A. Al-Wan and N.N. Sjarif, An extensive analysis and conduct comparative based on statistical attach of LSB substitution and LSB matching, Int. J. Engin. Technol. 7 (2018), 4008–4023.
[11] J. Katz, A.J. Menezes, P.C. Van Oorschot and S.A. Vanstone, Handbook of applied cryptography, CRC Press. 1996.
[12] I.A. Khalil and M.S. Meaad, Contourlet transformation for text hiding in hsv color image, Int. J. Comput. Networks Commun. Secur. 1 (2013), no. 4.
[13] S.A. Laskar and K. Hemachandran, Combining JPEG steganography and substitution encryption for secure data communication, Computer Science & Information Technology, 2012.
[14] W.R. Matthew, Pivoting for LU factorization, University of Puget Sound, 2014.
[15] S. Mishra, V.K. Yadav, M.C. Trivedi and T. Shrimali, Audio steganography techniques, A Survey in Advances in Computer and Computational Sciences, Springer, Singapore, 2018, p. 581–589.
[16] T. Morkel, Image steganography applications for secure communication Doctoral dissertation, University of Pretoria, 2012.
[17] K. Muhammad, J. Ahmad, M. Sajjad and M. Zubair, Secure image steganography using cryptography and image transposition, arXiv preprint arXiv:1510.04413. 2015.
[18] V. Nagarajan, N.K. Abitha Gladis and D. Nagarajan. Compression and denies of an image by LU and QR decomposition, Int. J. Res. Engin. Appl. Sci. 6 (2016), no. 9, 1–4.
[19] F.A.P. Petitcolas, Information hiding: a survey, Proc. IEEE 87 (1999), no. 7, 1062–1078.
[20] G. Phillip, M. Walter and H.W. Margaret, Numerical linear algebra and optimization, Addison-Wesley Publishing Company, 1991.
[21] M.H. Qasim, New Metrics for steganography algorithm quality, Int. J. Adv. Sci. Technol. 29 (2020), no. 2.
[22] L. Riccardo and B. Mauro, Lossless compression of encrypted grey-level and color images, 16th Eur. Signal Process. Conf. (EUSIPCO 2008), Lausanne, Switzerland, 25 (2008), no. 29, p. 1-5.
[23] D.R. Sridevi, P. Vijaya and K.S. Rao, Image steganography combined with cryptography council for innovative, Council Innov. Res. Peer Rev. Res. Pub. Syst. J. 9 (2013), no. 1.
[24] A. Schwarzenberg-Czerny, On matrix factorization and efficient least squares solution, Astron. Astrophys. Suppl. Ser. 110 (1995), no. 405, 110–405.
Volume 13, Issue 2
July 2022
Pages 227-235
  • Receive Date: 10 December 2021
  • Revise Date: 26 January 2022
  • Accept Date: 09 February 2022