RGB IMAGE BINARY DECOMPOSITION BASED ARABIC AND ENGLISH TEXTS HIDING ALGORITHM WITH 16 CHARACTERS FORMING VIGENERE KEY

Authors

  • Huda Hussein Abed Department of Communication Techniques Engineering, Engineering Technical College-Najaf, Al-Furat Al-Awsat Technical University, Najaf, Iraq https://orcid.org/0000-0001-7450-1391
  • Salim Muhsin Wadi Department of Communication Techniques Engineering, Engineering Technical College-Najaf, Al-Furat Al-Awsat Technical University, Najaf, Iraq
  • Aqeel Sajjad Shaeel Engineering Technical College-Najaf, Al-Furat Al-Awsat Technical University, Najaf, Iraq https://orcid.org/0009-0003-8196-2542

DOI:

https://doi.org/10.30572/2018/KJE/160308

Keywords:

Arabic text, Vigenere Key, RGB Image, English Text, Hiding Algorithm, Encryption

Abstract

The transfer of secret texts via channels requires a higher level of security to prevent any third party from revealing or extracting any information related to it. In this paper, a secure hiding algorithm for protecting the secret texts either Arabic or English based on RGB image binary decomposition with 16 characters forming the Vigenere key is proposed. The main feature of the proposed algorithm can be summarized as offering security without transferring any information relating to the secret texts with the stego image. The RGB image is scrambled by binary decomposition and reordered its bit plan. Then, the secret text either Arabic or English is encrypted using 16 characters of Vigenere key with a new method for forming this key based on primary and secondary diagonal pixels of the scrambled red channel. On the other hand, the ciphertext length is hidden in the corner pixels of the same scrambled red channel. The performance of the proposed steganographic scheme is evaluated using the elapsed times for its implementation, PSNR, and MSE while the security provided for the spatial domain pixels in the scrambled green and blue channels before hiding the ciphertext is evaluated using histogram analysis and the entropy value. The simulation results demonstrate the security that is provided for the secret texts during the transmission of the RGB stego image

Downloads

Download data is not yet available.

References

Abdullah, S.F. and Nawaf, S.F., (2023). Optimizing Data Security with Hybrid Scheme Based on LSB and DWT. Tikrit Journal of Engineering Sciences, 30(3), pp.190-199. DOI: http://doi.org/10.25130/tjes.30.3.17.

Abed, H.H., Shaeel, A.S. and Abbas Annoze, R.S., (2023). Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement. International Journal of Electrical & Computer Engineering (2088-8708), 13(6). DOI: 10.11591/ijece.v13i6.pp6797-6805.

Akhshani, A., Behnia, S., Akhavan, A., Hassan, H.A. and Hassan, Z.J.O.C., (2010). A novel scheme for image encryption based on 2D piecewise chaotic maps. Optics Communications, 283(17), pp.3259-3266. DOI: 10.1016/j.optcom.2010.04.056.

ALabaichi, A., Al-Dabbas, M.A.A.A.K. and Salih, A., (2020). Image steganography using least significant bit and secret map techniques. International journal of electrical & computer engineering (2088-8708), 10(1). DOI: 10.11591/ijece.v10i1.pp935-946.

Alanazi, N., Khan, E. and Gutub, A., (2020). Functionality-improved Arabic text steganography based on unicode features. Arabian Journal for Science and Engineering, 45, pp.11037-11050. DOI: 10.1007/s13369-020-04917-5.

Alanazi, N., Khan, E. and Gutub, A., (2021). Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multimedia Tools and Applications, 80, pp.1403-1431. DOI: 10.1007/s11042-020-09667-y.

Alanzy, M., Alomrani, R., Alqarni, B. and Almutairi, S., (2023). Image Steganography Using LSB and Hybrid Encryption Algorithms. Applied Sciences, 13(21), p.11771. DOI: 10.3390/app132111771.

Ali, M.A., Houssein, E.H., Eldemerdash, N.A. and Hassanien, A.E., (2017). Increasing the hiding capacity in image steganography using Braille code. International Journal of Intelligent Engineering Informatics, 5(4), pp.327-341. DOI: 10.1504/IJIEI.2017.087938.

Alkhudaydi, M. and Gutub, A., (2021). Securing data via cryptography and arabic text steganography. SN Computer Science, 2(1), p.46. DOI: 10.1007/s42979-020-00438-y.

Alsuhibany, S.A., (2019). Developing a visual cryptography tool for Arabic text. IEEE Access, 7, pp.76573-76579. DOI: 10.1109/ACCESS.2019.2920858.

Altamimi, A.S.H. and Kaittan, A.M., (2021). A Proposed Arabic Text Encryption Method Using Multiple Ciphers. Special Issue on Computing Technology and Information Management, 18, pp. 319-326. DOI: 10.14704/WEB/V18SI04/WEB18131.

Aslam, L., Saeed, A., Qureshi, I.M., Amir, M. and Khan, W., (2020). Novel Image Steganography Based on Preprocessing of Secrete Messages to Attain Enhanced Data Security and Improved Payload Capacity. Traitement du Signal, 37(1), pp. 129-136. DOI: 10.18280/ts.370117.

Benyahia, K., Khobzaoui, A. and Benbakreti, S., (2024). Embedding secrets in pixels: two-level security through DNA encryption and LSB image steganography. Brazilian Journal of Technology, 7(2), pp. e70354-e70354. DOI:10.38152/bjtv7n2-005.

Brahim, A.H., Pacha, A.A. and Said, N.H., (2023). A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes. Information Security Journal: A Global Perspective, 32(2), pp.59-75. https://doi.org/10.1080/19393555.2021.1943572.

Cheddad, A., Condell, J., Curran, K. and Mc Kevitt, P., (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), pp.727-752. DOI: 10.1016/j.sigpro.2009.08.010.

Chen, C., Sun, K. and He, S., (2020). An improved image encryption algorithm with finite computing precision. Signal Processing, 168, p.107340. DOI: 10.1016/j.sigpro.2019.107340.

Chen, L., Zhao, D. and Ge, F., (2013). Image encryption based on singular value decomposition and Arnold transform in fractional domain. Optics Communications, 291, pp.98-103. https://doi.org/10.1016/j.optcom.2012.10.080

Chen, M.C., (2010). Image security and recognition system. The University of Texas at San Antonio.

Gayer, A. and Shy, O., (2005). Copyright enforcement in the digital era. CESifo Economic Studies, 51(2-3), pp.477-489. DOI: 10.7551/mitpress/3740.003.0008.

Ghadi, Y.Y., AlShloul, T., Nezami, Z.I., Ali, H., Asif, M. and Bah, M.J., (2023). Enhanced payload volume in the least significant bits image steganography using hash function. Peer J Computer Science, 9, p.e1606. DOI: 10.7717/peerj-cs.1606.

Ghoul, S., Sulaiman, R. and Shukur, Z., (2023). A review on security techniques in image steganography. International Journal of Advanced Computer Science and Applications, 14(6). DOI: 10.14569/IJACSA.2023.0140640.

Han, J., Park, C.S., Ryu, D.H. and Kim, E.S., (1999). Optical image encryption based on XOR operations. Optical Engineering, 38(1), pp.47-54. https://doi.org/10.1117/1.602060

Handrizal, Tarigan, J.T. and Putra, D.I., (2021). Implementation of Steganography Modified Least Significant Bit using the Columnar Transposition Cipher and Caesar Cipher Algorithm in Image Insertion. In Journal of Physics: Conference Series, 1898 (1), p. 012003. IOP Publishing. DOI: 10.1088/1742-6596/1898/1/012003.

Kamal, S.T., Hosny, K.M., Elgindy, T.M., Darwish, M.M. and Fouda, M.M., (2021). A new image encryption algorithm for grey and color medical images. IEEE Access, 9, pp.37855-37865. DOI: 10.1109/ACCESS.2021.3063237.

Kankanhalli, M.S. and Guan, T.T., (2002). Compressed-domain scrambler/descrambler for digital video. IEEE Transactions on Consumer Electronics, 48(2), pp.356-365. DOI: 10.1109/TCE.2002.1010142.

MACİT, H.B., (2022). A Crypto-Stegano Hybrid Application on Spatial Domain. Bayburt Üniversitesi Fen Bilimleri Dergisi, 5(2), pp.154-164. DOI: 10.55117/bufbd.1100693.

Milosav, P., Milosavljević, M. and Banjac, Z., (2023). Steganographic method in selected areas of the stego-carrier in the spatial domain. Symmetry, 15(5), p.1015. DOI: 10.3390/sym15051015.

Mukherjee, N., Paul, G. and Saha, S.K., (2021). Two-point FFT-based high capacity image steganography using calendar based message encoding. Information Sciences, 552, pp.278-290. DOI: 10.1016/j.ins.2020.11.044.

Obeidat, A.A., (2017). Arabic Text Steganography Using Unicode of Non-Joined to Right Side Letters. J. Comput. Sci., 13(6), pp.184-191. DOI: 10.3844/jcssp.2017.184.191.

Putra, M.H.P. and Kharisma, R.S., (2018). Hybrid Kriptografi-Steganografi Menggunakan Vernam Cipher, Vigenere Cipher Dan LSB Pada Pengiriman Pesan Rahasia. INTECHNO Journal-Information Technology Journal, 1(1), pp.6-10.

Saeidi, Z., Yazdi, A., Mashhadi, S., Hadian, M. and Gutub, A., (2024). High performance image steganography integrating IWT and Hamming code within secret sharing. IET Image Processing, 18(1), pp.129-139. DOI: 10.1049/ipr2.12938.

Samanth, S., KV, P. and Balachandra, M., (2023). CLEA-256-based text and image encryption algorithm for security in IOD networks. Cogent Engineering, 10(1), p.2234123. DOI: 10.1080/23311916.2023.2234123.

Setiadi, D.R.I.M., (2021). PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimedia Tools and Applications, 80(6), pp.8423-8444. DOI: 10.1007/s11042-020-10035-z.

Setiadi, D.R.I.M., (2022). Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. Journal of King Saud University – Computer and Information Sciences, 34(2), pp. 104-114. DOI: 10.1016/j.jksuci.2019.12.007.

Sharma, V.K., Srivastava, D.K. and Mathur, P., (2018). Efficient image steganography using graph signal processing. IET Image Processing, 12(6), pp.1065-1071. DOI: 10.1049/iet-ipr.2017.0965.

Shmueli, R., Mishra, D., Shmueli, T. and Hadar, O., (2024). A novel technique for image steganography based on maximum energy seam. Multimedia Tools and Applications, pp.1-14. DOI: 10.1007/s11042-024-18476-6.

SIPI Image Database, Available at: https://sipi.usc.edu/database/database.php?volume=aerials

Soria-Lorente, A. and Berres, S., (2017). A secure steganographic algorithm based on frequency domain for the transmission of hidden information. Security and Communication Networks, 2017(1), pp. 1-14. DOI: 10.1155/2017/5397082.

Sultan, N., (2019). Image compression by using walsh and framelet transform. Kufa Journal of Engineering, 10(2), pp.27-41. DOI: 10.30572/2018/kje/100203.

Swain, G. and Lenka, S.K., (2011), December. A better RGB channel based image steganography technique. In International Conference on Computing and Communication Systems (pp. 470-478). Berlin, Heidelberg: Springer Berlin Heidelberg. DOI: 10.1007/978-3-642-29216-3_51.

Tevaramani, S.S. and Ravi, J., (2022). Image steganography performance analysis using discrete wavelet transform and alpha blending for secure communication. Global Transitions Proceedings, 3(1), pp.208-214. DOI: 10.1016/j.gltp.2022.03.024.

Thahab, A. T. (2015). Three dimensional dct and temporal secondary clustering based video steganography. Kufa Journal of Engineering, 6(2), pp. 90-100. DOI: 10.30572/2018/KJE/621148.

Voleti, L., Balajee, R.M., Vallepu, S.K., Bayoju, K. and Srinivas, D., (2021). A secure image steganography using improved LSB technique and Vigenere cipher algorithm. International Conference on Artificial Intelligence and Smart Systems (ICAIS), IEEE, pp. 1005-1010. DOI: 10.1109/ICAIS50930.2021.9395794.

Wadi, S.M., Abed, H.H., Malik, N.T. and Abdullsadah, A.T., (2022). Binary decomposition-based Image cipher algorithm with flexible method for key construction. Indonesian Journal of Electrical Engineering and Computer Science, 28(1), pp.201-208. DOI: 10.11591/ijeecs.v28.i1.pp201-208.

Younus, Z.S. and Hussain, M.K., (2022). Image steganography using exploiting modification direction for compressed encrypted data. Journal of King Saud University-Computer and Information Sciences, 34(6), pp.2951-2963. DOI: 10.1016/j.jksuci.2019.04.008.

Zakaria, A.A., Hussain, M., Wahab, A.W.A., Idris, M.Y.I., Abdullah, N.A. and Jung, K.H., (2018). High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Applied Sciences, 8(11), p.2199. DOI: 10.3390/app8112199.

Zhu, Z.L., Zhang, W., Wong, K.W. and Yu, H., (2011). A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences, 181(6), pp.1171-1186. DOI: 10.1016/j.ins.2010.11.009.

Zia, U., McCartney, M., Scotney, B., Martinez, J., AbuTair, M., Memon, J. and Sajjad, A., (2022). Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. International Journal of Information Security, 21(4), pp.917-935. DOI: 10.1007/s10207-022-00588-5.

Downloads

Published

2025-07-31

How to Cite

Huda Hussein Abed, et al. “RGB IMAGE BINARY DECOMPOSITION BASED ARABIC AND ENGLISH TEXTS HIDING ALGORITHM WITH 16 CHARACTERS FORMING VIGENERE KEY”. Kufa Journal of Engineering, vol. 16, no. 3, July 2025, pp. 112-31, https://doi.org/10.30572/2018/KJE/160308.

Share