جۆری توێژینه‌وه‌ : Original Article

نوسه‌ران

1 Collage of computer science and information technology,/university of Basrah

2 Collage of Science , university of Basrah

پوخته‌

Availability of data anywhere and ease of access and interception the information in different forms as text ,images ,video…etc., create an important issue represented by data security both steganography and encryption was appeared to achieve this mission .  In this paper a hybrid technique was used to secure messages of grayscale and colored images in RGB cover image by encrypting the message with Hill encrypting algorithm and hiding it by LSB method in RGB image with random locations generated by seed number and taking three LSB bits , many different sizes of images was experimented and results was analyzed by PSNR , Correlation and histogram analysis methods , all proves the efficiency of proposed technique in securing images .

1.      Gotfried C. Prasetyadi ; Achmad Benny Mutiara ; Rina Refianti (2018) ,File encryption and hiding application based on advanced encryption standard (AES) and append insertion ,steganography method . 2017 Second International Conference on Informatics and Computing (ICIC), Jayapura, Indonesia.
1.     Sevierda Raniprima ; Bambang Hidayat ; Nur Andini (2017).Digital image steganography with encryption based on rubik's cube principle. 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC). Bandung, Indonesia.
 
2.       Praneeta D., & Padma B.( 2014) ,  Hiding Image in Image by using FMM with LSB Substitution in Image Steganography , International Journal of Advance Research in Computer Science and Management Studies, Vol. 2, Issue 11.
 
3.       Snehal O.Mundhada, V. K.Shandilya (2012).Spatial and Transformation Domain Techniques for Image Enhancement. International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 1, Issue 2 , ISSN: 2319-5967.
 
4.       Ankit Dhamija; Vijay Dhaka (2016).A Novel Cryptographic and Steganographic Approach for Secure Cloud Data Migration. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). 978-1-4673-7910-6/15/$31.00 ,2015 IEEE.
 
5.        Haider M. Al-Mashadi, Ala'a A. Khalaf .(2018) .Hybrid Homomorphic Cryptosystem For Secure Transfer Of Color Image On Public Cloud . Journal of Theoretical and Applied Information Technology. Vol.96. No 19. ISSN: 1992-8645.
 
6.       Iman Qays Abduljaleel.(2016).Using IWT and LSB Method to Hide Encrypted image in Color image . Journal of Basrah Researches ((Sciences)) Vol. (42). No. (1) A.
 
7.      Yani Parti Astuti ; De Rosal Ignatius Moses Setiadi ; Eko Hari Rachmawanto ; Christy Atika Sari (2018). Simple and secure image steganography using LSB and triple XOR operation on MSB. 2018 International Conference on Information and Communications Technology (ICOIACT). Publisher: IEEE. Yogyakarta, Indonesia.
 
8.       Bairai, A. K.( 2011), ASCII based Even-Odd Cryptography with Gray code and Image Steganography: A dimension in Data Security, ISSN:2078-5828 (Print), ISSN 2218- 5224 (Online), Vol.01,No.2, , pp:37-41, Manuscript Code: 110112.
 
9.      Qiang Zhang , Ling Guo, Xiaopeng Wei, (2010). Image encryption using DNA addition combining with chaotic maps. Mathematical and Computer Modelling, Vol. 52, PP. 2028–2035.
 
10.Adinarayana Reddy Ka, Vishnuvardhan Bb, Madhuviswanathamc, Krishna A. V. N.d (2012) .A Modified Hill Cipher Based on Circulant Matrices. Procedia Technology 4(2012) 114 – 118. 2212-0173 © 2012 Published by Elsevier Ltd. doi: 10.1016/j.protcy.2012.05.016 .
 
11.  Raouf Hamzaoui, Dietmar Saupe . (2006). Barni, Mauro, ed. Fractal Image Compression. Document and Image Compression. 968. CRC Press. pp. 168–169. ISBN 9780849335563. Retrieved 5 April 2011.
 
12.  Haider M. Al-Mashhadi.(2017).Quality Assessment for Image Encryption Techniques using Fuzzy Logic System.  International Journal of Computer Applications,Vol. 157, No 5 .
 
13.  Haider M. Al-Mashhadi; Iman Q. Abduljaleel.(2017) .Color Image Encryption using Chaotic Maps, Triangular Scrambling, with DNA Sequences. 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT), Slemani – Iraq. 978-1-5386-2955-0/17/$31.00 ©2017 IEEE.
 
1.      Gotfried C. Prasetyadi ; Achmad Benny Mutiara ; Rina Refianti (2018) ,File encryption and hiding application based on advanced encryption standard (AES) and append insertion ,steganography method . 2017 Second International Conference on Informatics and Computing (ICIC), Jayapura, Indonesia.
 
2.     Sevierda Raniprima ; Bambang Hidayat ; Nur Andini (2017).Digital image steganography with encryption based on rubik's cube principle. 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC). Bandung, Indonesia.
 
3.       Praneeta D., & Padma B.( 2014) ,  Hiding Image in Image by using FMM with LSB Substitution in Image Steganography , International Journal of Advance Research in Computer Science and Management Studies, Vol. 2, Issue 11.
 
4.       Snehal O.Mundhada, V. K.Shandilya (2012).Spatial and Transformation Domain Techniques for Image Enhancement. International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 1, Issue 2 , ISSN: 2319-5967.
 
5.       Ankit Dhamija; Vijay Dhaka (2016).A Novel Cryptographic and Steganographic Approach for Secure Cloud Data Migration. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). 978-1-4673-7910-6/15/$31.00 ,2015 IEEE.
 
6.        Haider M. Al-Mashadi, Ala'a A. Khalaf .(2018) .Hybrid Homomorphic Cryptosystem For Secure Transfer Of Color Image On Public Cloud . Journal of Theoretical and Applied Information Technology. Vol.96. No 19. ISSN: 1992-8645.
 
7.       Iman Qays Abduljaleel.(2016).Using IWT and LSB Method to Hide Encrypted image in Color image . Journal of Basrah Researches ((Sciences)) Vol. (42). No. (1) A.
 
8.      Yani Parti Astuti ; De Rosal Ignatius Moses Setiadi ; Eko Hari Rachmawanto ; Christy Atika Sari (2018). Simple and secure image steganography using LSB and triple XOR operation on MSB. 2018 International Conference on Information and Communications Technology (ICOIACT). Publisher: IEEE. Yogyakarta, Indonesia.
 
9.       Bairai, A. K.( 2011), ASCII based Even-Odd Cryptography with Gray code and Image Steganography: A dimension in Data Security, ISSN:2078-5828 (Print), ISSN 2218- 5224 (Online), Vol.01,No.2, , pp:37-41, Manuscript Code: 110112.
 
10. Qiang Zhang , Ling Guo, Xiaopeng Wei, (2010). Image encryption using DNA addition combining with chaotic maps. Mathematical and Computer Modelling, Vol. 52, PP. 2028–2035.
 
11.Adinarayana Reddy Ka, Vishnuvardhan Bb, Madhuviswanathamc, Krishna A. V. N.d (2012) .A Modified Hill Cipher Based on Circulant Matrices. Procedia Technology 4(2012) 114 – 118. 2212-0173 © 2012 Published by Elsevier Ltd. doi: 10.1016/j.protcy.2012.05.016 .
 
12.  Raouf Hamzaoui, Dietmar Saupe . (2006). Barni, Mauro, ed. Fractal Image Compression. Document and Image Compression. 968. CRC Press. pp. 168–169. ISBN 9780849335563. Retrieved 5 April 2011.
 
13.  Haider M. Al-Mashhadi.(2017).Quality Assessment for Image Encryption Techniques using Fuzzy Logic System.  International Journal of Computer Applications,Vol. 157, No 5 .
 
14.  Haider M. Al-Mashhadi; Iman Q. Abduljaleel.(2017) .Color Image Encryption using Chaotic Maps, Triangular Scrambling, with DNA Sequences. 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT), Slemani – Iraq. 978-1-5386-2955-0/17/$31.00 ©2017 IEEE.