Hiding a Secret Message Encrypted by S-DES Algorithm

Authors

DOI:

https://doi.org/10.31642/JoKMC/2018/100213

Keywords:

Cryptography, S-DES algorithm, Steganography, Information hiding, LSB algorithm, median filter, Stego-object

Abstract

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cycle to increases the complexity of the algorithm detection. An additional shared key between the sender and the receiver is added which is applied before starting the encryption process, that key must be hex-decimal in order to increase the level of security and give enough time to delay the guessing of the secret text by the attackers.  The secret message data is concealed using one of the two techniques: either least significant bit (3-LSB) steganography or hiding in green and blue bits. To expedite the concealment process, the cover image is enhanced by applying a median filter, the median filter removes noise from the image while preserving its details. Finally, comparing the results of the two methods to determine which is better for the cover image in terms of PSNR metrics and hiding process time.

Downloads

Download data is not yet available.

References

Ahmed AL-Shaaby, Talal AlKharobi, Cryptography and Steganography: New Approach, Transactions on Networks and Communications, Volume 5 No. 6, December (2017); pp: 25-38

Rawaa Hamza Ali, Jamal Mohamed Kadhim1, Text-based Steganography using Huffman Compression and AES Encryption Algorithm, Iraqi Journal of Science, 2021, Vol. 62, No. 11,pp: 4110-4120DOI: 10.24996/ijs.2021.62.11.31.

Pria Bharti, Roopali Soni, New Approach of Data Hiding in Images Using Cryptography and steganography, International Journal of Computer Applications,Vol.58, No.18, 2012, pp1-5.

Muna M. Hummady, Ameer Hussein Morad, Enhancement of System Security by Using LSB and RSA Algorithms, Al-Khwarizmi Engineering Journal, Vol. 18, No. 1, March 2022, P. P. 26-37.

Venkata Sai Manoj, Cryptography and Steganography, International Journal of Computer Applications (0975 8887), Volume 1 No.12.

Nada Abdul Aziz Mustafa, Text Hiding In Text Using Invisible Character, International Journal of Electrical and Computer Engineering, 2020. 10(4): p. 3550.

Deepesh Rawat, Vijaya Bhandari, A Steganography Technique For Hiding Image In An Image Using LSB Method For 24 Bit Color Image, International Journal of Computer Applications. 2013. 64(20).

Rasha H.Ali, Steganography in Audio Using Wavelet and DES, Baghdad Science Journal, Vol.12 (2) Jun 7, 2015

Elaf Ali Abbood, Rusul Mohammed Neamah, Shaymaa Abdulkadhm, Text in Image Hiding using Developed LSB and Random Method, International Journal of Electrical & Computer Engineering (2088-8708), 2018. 8(4).

Dipti Kapoor Sarmah, Neha bajpai, Proposed System for Data Hiding Using Cryptography and Steganography, International Journal of Computer Applications (0975 8887), Volume 8 No. 9, October 2010.

Shailender Gupta, Ankur Goyal, Bharat Bhushan, Information Hiding Using Least Significant Bit Steganography and Cryptography, International Journal of Modern Education and Computer Science, 2012. 4(6): p. 27.

Safwat Helmy Hamad, Amal Khalifa, Ahmed Atito Elhadad, S. Z. Rida, A Modified Play fair Cipher for Encrypting Digital Images, J. of Commun. & Comput. Eng. ISSN 2090-6234, Volume 3, Issue 2, 2013, Pages 1:9.

Huda Dheyauldeen Najeeb, Israa Tahseen Ali, A proposal of Multimedia Steganography Algorithm based on Improved Least Significant Bit (LSB) Method, Journal of Science, 2017, Vol. 58, No.4B, pp: 2188-2199DOI:10.24996/ ijs.2017.58.4B.22.

Keshav Raj1, Bharti Sharma1, Neeraj Kumar, Dr. Dalveer Kaur, Differential Cryptanalysis on S-DES, International Journal of Management & Information Technology, Volume 1, No 2, July, 2012.

Sanjay Kumar, Sandeep Srivastava, Image Encryption using Simplified Data Encryption Standard (S-DES), International Journal of Computer Applications (0975 – 8887), Volume 104 – No.2, October 2014.

Youlian Zhu, Cheng Huang, Improved Adaptive Median Filtering, Computer Engineering and Applications. 2010, vol.46, no. 3, pp. 175-176.

Chao Wang, Zhongfu Ye, Salt-and-pepper noise removal by adaptive median filter and TV in painting, Journal of University of Science and Technology of China, 2008, vol.38, no. 3, pp. 282-287.

Guohong Liu, Wenming Guo, Application of improved arthmetic of median filtering denoising, Computer Engineering and Applications, 2010, vol.46, no.10, pp.187-189.

Mohammed Abbas Fadhil Al-Husainy, Diaa Mohammed Uliyan, A Secret-Key Image Steganography Technique using Random Chain Codes, International Journal of Technology, 2019. 10(4): p. 731-740.

Manoj, I. V. S., Cryptography and Steganography, International Journal of Computer Applications (09758887), Vol.1, No.12, 2010, pp 63-68.

Reyam Jassim Essa, Nada A.Z. Abdullah, Rawaa Dawoud AL-Dabbagh, Steganography Technique using Genetic Algorithm. Iraqi Journal of Science, 2018, Vol. 59, No.3A, pp: 1312- 1325, DOI: 10.24996Lijs. 2018.59.3A.19

Soumendu Chakraborty, Anand Singh Jalal, Charul Bhatnagar, LSB Based Non Blind Predictive Edge Adaptive Image Steganography, Multimedia Tools and Applications, vol-76, no-6, pp. 7973–7987, (2017). (Springer) ISSN/ISBN: 1573-7721.

Downloads

Published

2023-08-31

How to Cite

Mustafa, N. A. aziz. (2023). Hiding a Secret Message Encrypted by S-DES Algorithm . Journal of Kufa for Mathematics and Computer, 10(2), 80–85. https://doi.org/10.31642/JoKMC/2018/100213

Similar Articles

1 2 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.