A classical approach for hiding encryption key in the same encrypted text document
DOI:
https://doi.org/10.31642/JoKMC/2018/050104Keywords:
encrypting and steganography techniques, hybrid systems, Unicode character set.Abstract
Data encrypting and steganography techniques each have its own merits and weaknesses. Crackers and hackers developed many software applications that can attack the weakness of these techniques and thus can reach to the meaning of the private information and its existence. In this paper, a simple technique is proposed to make use of encrypting and steganography merits simultaneously, and thus makes any attempt for breaking both techniques at the same time harder than applying each of them alone. The proposal uses English, Arabic, or mixed writing plain text. Encrypting the text by AES-encrypting algorithm with an encryption key of 128 bit long and then hiding the encrypted text with only one part of the encrypting key (sender key only), in another English/Arabic (cover), plain text. The text hiding technique is done according to the nonprintable characters of the Unicode character set method. The proposed technique is coded into a form of Matlab program. Experimenting with this paper technique shows how difficult to break the system and thus can applying it in emailing private documents between users connected to a virtual network on an insecure public channelDownloads
References
Philip Brey, Adam Briggle,and Edward Spence, ”The Good Life in Technological Age”, New York, Routledge, Taylor & Francis, 2012 DOI: https://doi.org/10.4324/9780203124581
G.Kalpana, P. V. Kumar and R.V. Krishnaiah, “A Brief Survey on Security Issues in Cloud and its Service Models", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 6, June 2015.
Jayaram P, Ranganatha H R, Anupama H S, “Information hiding using Audio steganography”, The International Journal of Multimedia & Its Applications, Vol.3, No.3, August 2011 DOI: https://doi.org/10.5121/ijma.2011.3308
Arvind Kumar, and Km. Pooja, “Steganography- A Data Hiding Technique”, International Journal of Computer Applications, Vol. 9, Issue 7, Nov. 2010. DOI: https://doi.org/10.5120/1398-1887
Palak Mahajan, ”Steganography: A Data Hiding Technique“, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 11, November 2014.
C. C. Chang, P. Tsai, and M.H. Lin, "An Adaptive Steganography for Index-based images using Codeword Grouping", Advances in Multimedia Information Processing –PCM, Springer, Vol. 3333, pp 731-738, 2004. DOI: https://doi.org/10.1007/978-3-540-30543-9_91
Melvin Hausner, “Notes on Number Theory and Cryptography (V55.0106) Quantitative Reasoning: 4 Cryptography “, New York University, 2002.
Debnath Bhattacharyya, Asmita Haveliya, and Tai-hoon Kim, " Secure Data Hiding in Binary Text Document for Authentication", Applied.
Mathematic. Information and Science, Vol. 8, No. 1, 371-378 (2014).
L. Y. Por, B. Delina, “Information Hiding: A New Approach In Text Steganography”, 7th Wseas Int. Conf. On Applied Computer & Applied Computational Science (Acacos ‟08), Hangzhou, China, (2008)
M. J. Khami, “Unlimited size of English plaintext-in-text hiding algorithm”, International Journal Of Computer Science and Engineering, Vol. 6, Issue 1, Dec. – Jan. 2017; 89-96.
M. j. Khami, “New rules-based approach for text data hiding", International Journal Of Computer Science and Engineering, Vol. 6, Issue 3, Apr May 2017; 1-20.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2018 Prof. Dr. Taleb A. S. Obaid, Assist. Prof. Dr. Mohammed J. Khami, Dr. Lemya Gh. Shehab
This work is licensed under a Creative Commons Attribution 4.0 International License.
which allows users to copy, create extracts, abstracts, and new works from the Article, alter and revise the Article, and make commercial use of the Article (including reuse and/or resale of the Article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made and the licensor is not represented as endorsing the use made of the work.