A classical approach for hiding encryption key in the same encrypted text document

Authors

  • Prof. Dr. Taleb A. S. Obaid Basra University
  • Assist. Prof. Dr. Mohammed J. Khami Basra University
  • Dr. Lemya Gh. Shehab Basra University

DOI:

https://doi.org/10.31642/JoKMC/2018/050104

Keywords:

encrypting and steganography techniques, hybrid systems, Unicode character set.

Abstract

Data encrypting and steganography techniques each have its own merits and weaknesses. Crackers and hackers developed many software applications that can attack the weakness of these techniques and thus can reach to the meaning of the private information and its existence. In this paper, a simple technique is proposed to make use of encrypting and steganography merits simultaneously, and thus makes any attempt for breaking both techniques at the same time harder than applying each of them alone. The proposal uses English, Arabic, or mixed writing plain text. Encrypting the text by AES-encrypting algorithm with an encryption key of 128 bit long and then hiding the encrypted text with only one part of the encrypting key (sender key only), in another English/Arabic (cover), plain text. The text hiding technique is done according to the nonprintable characters of the Unicode character set method. The proposed technique is coded into a form of Matlab program. Experimenting with this paper technique shows how difficult to break the system and thus can applying it in emailing private documents between users connected to a virtual network on an insecure public channel

Downloads

Download data is not yet available.

References

Philip Brey, Adam Briggle,and Edward Spence, ”The Good Life in Technological Age”, New York, Routledge, Taylor & Francis, 2012 DOI: https://doi.org/10.4324/9780203124581

G.Kalpana, P. V. Kumar and R.V. Krishnaiah, “A Brief Survey on Security Issues in Cloud and its Service Models", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 6, June 2015.

Jayaram P, Ranganatha H R, Anupama H S, “Information hiding using Audio steganography”, The International Journal of Multimedia & Its Applications, Vol.3, No.3, August 2011 DOI: https://doi.org/10.5121/ijma.2011.3308

Arvind Kumar, and Km. Pooja, “Steganography- A Data Hiding Technique”, International Journal of Computer Applications, Vol. 9, Issue 7, Nov. 2010. DOI: https://doi.org/10.5120/1398-1887

Palak Mahajan, ”Steganography: A Data Hiding Technique“, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 11, November 2014.

C. C. Chang, P. Tsai, and M.H. Lin, "An Adaptive Steganography for Index-based images using Codeword Grouping", Advances in Multimedia Information Processing –PCM, Springer, Vol. 3333, pp 731-738, 2004. DOI: https://doi.org/10.1007/978-3-540-30543-9_91

Melvin Hausner, “Notes on Number Theory and Cryptography (V55.0106) Quantitative Reasoning: 4 Cryptography “, New York University, 2002.

Debnath Bhattacharyya, Asmita Haveliya, and Tai-hoon Kim, " Secure Data Hiding in Binary Text Document for Authentication", Applied.

Mathematic. Information and Science, Vol. 8, No. 1, 371-378 (2014).

L. Y. Por, B. Delina, “Information Hiding: A New Approach In Text Steganography”, 7th Wseas Int. Conf. On Applied Computer & Applied Computational Science (Acacos ‟08), Hangzhou, China, (2008)

M. J. Khami, “Unlimited size of English plaintext-in-text hiding algorithm”, International Journal Of Computer Science and Engineering, Vol. 6, Issue 1, Dec. – Jan. 2017; 89-96.

M. j. Khami, “New rules-based approach for text data hiding", International Journal Of Computer Science and Engineering, Vol. 6, Issue 3, Apr May 2017; 1-20.

Downloads

Published

2018-05-23

How to Cite

Obaid, P. D. T. A. S., Khami, A. P. D. M. J., & Shehab, D. L. G. (2018). A classical approach for hiding encryption key in the same encrypted text document. Journal of Kufa for Mathematics and Computer, 5(1), 25–38. https://doi.org/10.31642/JoKMC/2018/050104

Similar Articles

1 2 3 4 5 6 7 8 9 > >> 

You may also start an advanced similarity search for this article.