Multistage Encryption for Text Using Steganography and Cryptography

Authors

  • Mohammed Majid Msallam Computer Engineering Department, Ankara University, Ankara, Turkey
  • Fayez Aldoghan Computer Engineering Department, Ankara University, Ankara, Turkey

DOI:

https://doi.org/10.51173/jt.v5i1.1087

Keywords:

Caesar Cipher, Morse Code, Vigenere Cipher, Least Significant Bit, Multistage of Encryption

Abstract

Recently, the movement of data between smart devices has piqued the world's curiosity because it transmits important and unimportant data via the Internet. Thus, important data must be encrypted during passing over a network so that information can only access by an intended receiver and processed by it. As a result, information security has become even more critical than before. Our proposal suggests a method to secure data in three stages using cryptography and steganography. The important message will divide into two parts a part will encrypt by Caesar Cipher and another by Vigenere Cipher. The ciphertext will process by Morse code and will then hide in a cover image using Least Significant Bits (LSB) technique. According to the value the of peak signal-to-noise ratio (PSNR) obtained in this work our proposal has an extra security level and robustness. Finally, our research provides more security because of the mixture between cryptography and steganography.

Downloads

Download data is not yet available.

Author Biographies

Mohammed Majid Msallam, Computer Engineering Department, Ankara University, Ankara, Turkey

Control and Systems Engineering Department

Fayez Aldoghan, Computer Engineering Department, Ankara University, Ankara, Turkey

Control and Systems Engineering Department

References

M. Alotaibi, D. Al-hendi, B. Alroithy, M. AlGhamdi, and A. Gutub, “Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination,” Journal of Information Security & Cybercrimes Research, vol. 2, no. 1, pp. 73–82, 2019.

S. Ahmed Laskar, “High Capacity data hiding using LSB Steganography and Encryption,” International Journal of Database Management Systems, vol. 4, no. 6, pp. 57–68, 2012.

W. A. Shukur and K. K. Jabbar, “Information hiding using LSB technique based on developed PSO algorithm,” International Journal of Electrical and Computer Engineering, vol. 8, no. 2, pp. 1156–1168, 2018.

L. Voleti, R. M. Balajee, S. K. Vallepu, K. Bayoju, and D. Srinivas, “A Secure Image Steganography Using Improved Lsb Technique and Vigenere Cipher Algorithm,” Proceedings of the International Conference on Artificial Intelligence and Smart Systems, pp. 1005–1010, 2021.

E. V. Sidi, I. Diop, and K. Tall, “A New hybrid approach of Data Hiding Using LSB Steganography and Caesar cipher and RSA algorithm (S-ccr),” 2022 International Conference on Computer Communication and Informatics, pp. 25–28, 2022.

M. Azmi and Z. Zulkarnaen, “Implementasi Kombinasi Caesar Cipher dan Hill Cipher Menggunakan Modifikasi Sandi Morse Untuk Pengamanan Pesan Berbasis Teks,” Jurnal Teknologi Informasi dan Multimedia, vol. 3, no. 1, pp. 8–13, 2021.

O. M. Osman, M. E. A. Kanona, M. K. Hassan, A. A. E. Elkhair, K. S. Mohamed, "Hybrid multistage framework for data manipulation by combining cryptography and steganography." Bulletin of Electrical Engineering and Informatics vol 11, no. 1, pp. 327-335,2022.‏

J. M. Ahmed and Z. Ali, “Information Hiding using LSB technique,” International Journal of Computer Science and Network Security, vol. 11, no. 4,, pp. 18–25, 2011.

G. Song, K. Jang, and H. Kim, “Grover on Caesar and Vigenère Ciphers” Cryptology ePrint Archive, 2021.

Z. Qowi and N. Hudallah, “Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm,” Journal of Physics: Conference Series, 2021.

R. Hammad, K. A. Latif, A. Z. Amrullah, Hairani, A. Subki, P. Irfan, M. Zulfikri, L. Z. A. M, M. Innuddin, and K. Marzuki “Implementation of combined steganography and cryptography vigenere cipher, caesar cipher and converting periodic tables for securing secret message,” Journal of Physics: Conference Series, p.1-6, 2022.

S. N. Deshpande, V. A. Deshmukh, G. D. Arjun, H. R. Goskonda, A. R. Butala, and D. S. Datar, “Human Computer Interaction through Morse Code,” International Journal of Research in Engineering and Science, vol. 9, no. 7, pp. 54–61, 2021.

R. Seetharaman et al., “FPGA Based Morse Code Communicator for Visual and Speech Impaired People using Basys-3,” Proceedings of the International Conference on Electronics and Renewable Systems (ICEARS 2022), no. Icears, pp. 1889–1894, 2022.

H. A. Abdulkadhim and J. N. Shehab, “Audio steganography based on least significant bits algorithm with 4D grid multi-wing hyper-chaotic system,” International Journal of Electrical and Computer Engineering, vol. 12, no. 1, pp. 320–330, 2022.

N. F. H. Al Saffar, I. R. Al-Saiq, and R. R. M. Abo Alsabeh, “Asymmetric image encryption scheme based on Massey Omura scheme,” International Journal of Electrical and Computer Engineering, vol. 12, no. 1, pp. 1040–1047, 2022.

Y. Moussa and W. Alexan. " Message Security Through AES and LSB Embedding in Edge Detected Pixels of 3D Images." 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES). IEEE, 2020.‏

J. C. T. Arroyo, “An Efficient Least Significant Bit Image Steganography with Secret Writing and Compression Techniques,” International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, no. 3, pp. 3280–3286, 2020.

Classification of security system techniques

Downloads

Published

2023-03-31

How to Cite

Majid Msallam, M., & Fayez Aldoghan. (2023). Multistage Encryption for Text Using Steganography and Cryptography. Journal of Techniques, 5(1), 38–43. https://doi.org/10.51173/jt.v5i1.1087

Issue

Section

Engineering

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.