Data and image encryption through steganography inside an image (MKTEXT-7) and (MK-12,13,14,15)

Document Type : Research Paper

Authors

1 Department of Mathematics, Faculty of Basic Education, University of Kufa, Najaf, Iraq

2 Directorate of Education, Najaf Governorate, Najaf, Iraq

Abstract

We sometimes need to hide data such as texts or images of international paintings or important manuscripts of a high degree of confidentiality and confidentiality, and this is done through several tasks, including archiving or transferring the image of the painting or manuscript to another place. Of course, archiving and preservation are twofold: the first is archiving, documentation and preservation of paper. The second: archiving, documenting and electronic preservation, which is currently the widest due to the digital development in transactions in various fields. In our algorithms, we will hide texts or an image of a global painting located within the abstract art of the artist Dr Luqman Al-Mudhaffar within other images. This is done by hiding the numerical values of the text characters or the color values of the image matrix within the image matrix in which we will hide the text or the image of the global panel that we will call the warehouse image. So that when you look at the image, you see the image of the warehouse, and there is no reference to the text or the image of the global plate. This work, which is considered the secret of hiding the text or the image, will depend on two basic conditions (the first is that the image of the warehouse matches the image of the global board in terms of the number of rows and the number of columns. The second is the use of a secret key to hide and show that only authorized persons know). These two algorithms, which we will call (MKTEXT-7) \& (MK-12), are considered a new method for encoding text and images, and it is one of the products of the great digital development in computer science. Masking and comparisons with readings of previous algorithms. We hope that the results will be at the required level so that we can develop them into more complex algorithms. We will also later combine this algorithm with previous algorithms to come up with a more complex algorithm that intruders cannot decipher.

Keywords

[1] M.A.F. Al-Husainy and D.M. Uliyan, Image steganography technique based on extracted chains from the secret Key, J. Engin. Appl. Sci. 13 (2018), 4235–4244.
[2] S. Almuhammadi and A. Al-Shaaby, A survey on recent approaches combining cryptography and steganography, Comput. Sci. Inf. Technol. 2017 (2017), 63–74.
[3] K.I. Al-Saif and A.S. Abdullah, Color image enhancement based on contourlet transform coefficients, Aust. J. Basic Appl. Sci. 7 (2013), no. 8, 207–213.
[4] T.S. Barhoom and S.M.A. Mousa, A steganography LSB technique for hiding image within image using blowfish encryption algorithm, Int. J. Res. Eng. Sci. 3 (2015), 61–66.
[5] M. Douglas, K. Bailey, M. Leeney and K. Curran, An overview of steganography techniques applied to the protection of biometric data, Multimedia Tools Appl. 77 (2018), no. 13, 17333–17373.
[6] D. Gollmann, Computer Security, Wiley Interdiscip. Rev.: Comput. Statist. 2 (2010), no. 5, 544–554.
[7] Q.M. Hussein, New metrics for steganography algorithm quality, Int. J. Adv. Sci. Technol. 29 (2020), no. 2, 2092–2098.
[8] J.L. Kamm, SVD-Based Methods For Signal And Image Restoration, PhD Thesis, Emory University, United States, 1998.
[9] S.A. Laskar and K. Hemachandran, Combining JPEG steganography and substitution encryption for secure data communication, Comput. Sci. Inf. Technol. 5 (2012), 149–160.
[10] H. Mal Allah, The semiotic development of the structure of the abstract form, Arab Horizons Magazine 5-6 (2001), 97.
[11] A. McAndrew, An Introduction to Digital Image Processing with Matlab, Course Technology, 2004.
[12] P.P. Meier, Steganography 2.0: Digital resistance against repressive regimes, 5 June 2009, irevolution.wordpress.com.
[13] S. Mishra, V.K. Yadav, M.C. Trivedi and T. Shrimali, Audio steganography techniques: A survey, Advances in Computer and Computational Sciences, Springer, Singapore, 2018, pp. 581–589.
[14] T. Morkel, Image steganography applications for secure communication, Doctoral dissertation, University of Pretoria, 2012.
[15] K. Muhammad, J. Ahmad, M. Sajjad and M. Zubair. Secure image steganography using cryptography and image transposition, arXiv preprint arXiv:1510.04413 (2015).
[16] A.K.J. Mujaiser, The Code of Abstraction between Communication and the Aesthetic Concept in Modern Painting, Master’s Thesis, University of Baghdad, College of Fine Arts, Department of Fine Arts, 2003.
[17] V. Nagarajan, N.K. Abitha Gladis and D. Nagarajan, Compression and denies of an image by LU and QR decomposition, Int. J. Res. Engin. Appl. Sci. 6 (2016), no. 9, 1–4.
[18] F.A.P. Petitcolas, Information hiding: A survey, Proc. IEEE (special issue) 87 (1999), no. 7, 1062–1078.
[19] A. Schwarzenberg-Czerny, On matrix factorization and efficient least squares solution, Astron. Astroph. Suppl. Ser. 110 (1995), 405.
[20] D.R. Sridevi, P. Vijaya and K.S. Rao, Image steganography combined with cryptography, Counc. Innov. Res. Peer Rev. Res. Pub. Syst. J. 9 (2013), no. 1.
[21] K. Szczypiorski, Steganography in TCP/IP networks. State of the art and a proposal of a new system-HICCUPS, Warsaw University of Technology, Poland Institute of Telecommunications, Warsaw, Poland, 2003.
[22] H.A. Talib, Hide Text in Image By MATLAB- Technical Library, https://books-library.net/free-717582257- download.
Volume 14, Issue 1
January 2023
Pages 2571-2585
  • Receive Date: 06 November 2022
  • Revise Date: 19 December 2023
  • Accept Date: 05 January 2023