Transmitting Security Enforcement By Text Encrypting and Image Hiding Technique using Combined Encrypt/Hide Keys

Full Text (PDF, 644KB), PP.1-15

Views: 0 Downloads: 0


Mohammed Jawar Khami 1,*

1. Basra technical institute, Southern technical university, Basra, Iraq

* Corresponding author.


Received: 13 May 2017 / Revised: 25 Jul. 2017 / Accepted: 11 Sep. 2017 / Published: 8 Jan. 2018

Index Terms

Cryptography, Steganography, Keys combining, AES algorithm, LSB hide/extract techniques


Comparative study of cryptography and steganography techniques shows that they have some strong and weak points when they used alone. But as we know from soft computing techniques (neural, genetic, and fuzzy computing), that when combining (hybridizing), more than one techniques, by the suitable way to do a job, the outcome will be a better technique with more strong points and less weak points.  Work of this paper represents an attempt to prove that combining cryptography with steganography techniques will result in hard transmitting system to break and thus enforcing security issues of secret text data transmitting over public channels. Matlab programs are written to encrypt plain text secret information following AES encrypt/decrypt algorithm with a key of 128 bits long and then hide/extract the text according to LSB insertion method with a key of 128 bits long too. System tests show that both techniques enforce each other and private data transmitting become more secure.

Cite This Paper

Mohammed Jawar Khami,"Transmitting Security Enforcement By Text Encrypting and Image Hiding Technique using Combined Encrypt/Hide Keys", International Journal of Engineering and Manufacturing(IJEM), Vol.8, No.1, pp.1-15, 2018. DOI: 10.5815/ijem.2018.01.01


[1] Palak Mahajan, “Steganography: A data hiding technique”, International journal of advanced research in computer science and software engineering, Vol. 4, Issue 11, Nov. 2014.

[2] Auqib Hamid Lone, Ab Waheed Lone, Moin Uddin,"A novel scheme for image authentication and secret data sharing", International journal of computer network and information security(IJCNIS), Vol.8, No.9, pp.10-18, 2016.DOI: 10.5815/ijcnis.2016.09.

[3] A. Anuradha, Hardik B. Pandit, “Review on information techniques: A comparative analysis”, IJRET, Vol. 5, Issue 2, Feb. 2016, pp. 128-132.

[4] Ramanpreet Kaur, Baljit Singh, “Survey and analysis of various steganography techniques”, IJESAT, Vol. 2, Issue 3, May-June 2012.

[5] Arvind Kumar, Km. Pooja, “Steganography – A data hiding technique”, IJCA (0975-8887), Vol. 9, No. 7, Nov. 2010, pp. 19-23.

[6] Sahar A. El_Rahman,"A comprehensive image steganography tool using LSB scheme", IJIGSP, vol.7, no.6, pp.10-18, 2015.DOI: 10.5815/ijigsp.2015.06.02

[7] Sabyasachi Samanta, Saurabh Dutta, Goutam Sanyal,"A Novel approach of text steganography using nonlinear character positions (NCP)", IJCNIS, vol.6, no.1, pp.55-60,2014. DOI: 10.5815/ijcnis.2014.01.08

[8] Fahd Alharbi,"Novel high-quality data hiding system", IJIGSP, vol.5, no.7, pp.47-53, 2013.DOI: 10.5815/ijigsp.2013.07.07

[9] Ibrahim M. Hussain, M. Kamran Khan, Mohammad Naseem, Aisha Ajmal, Osama M. Hussain,"Improved bit plane splicing LSB technique for secret data hiding in images using linear congruent method", IJIGSP, vol.4, no.7, pp.1-14, 2012.

[10] P. Srinivasarao, P. V. Lakshmipriya, P. C. S. Azad, T. Alekhya, K. Raghavendrarao, K. Kishore, “A technique for data encryption and decryption”, International journal of future generation communication and networking, vol. 7, no. 2 (2014), pp.117-126.

[11] Thomas Baigneres, Pascal Junod, Yi Lu, Jean, “A classical introduction to cryptography exercise book”, Springer science & business media, 2006.

[12] Douglas Selent, “Advanced encryption standard”, nSight: Rivier academic journal, Vol. 6,Num. 2, Fall 2010.

[13] Mohammed J. Khami, Lemya G. Shehab and Zeynab M. Jawar, “Matlab Coding For Text Steganography System By Using LSB Insertion Method With Key”, Basrah journal of science (A) Vol.33 (2), 37-51, 2015.

[14] Champakamala .B.S, Padmini.K, Radhika .D. K., “Least significant bit algorithm for image steganography”, International journal of advanced computer technology (IJACT) ISSN:2319-7900 34 | Vol. 3, Issue. 4. August 25, 2014.

[15] Gabriel Macharia Kamau, Stephen Kimani, Waweru Mwangi, “An enhanced least significant bit steganographic method for information hiding”, Journal of information engineering and applications ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol 2, No.9, 2012.