High Security Image Cryptographic Algorithm Using Chaotic Encryption Algorithm with Hash-LSB Steganography
DOI:
https://doi.org/10.58564/IJSER.1.2.2022.53Keywords:
Image Encryption, Chaotic map, Cryptography, hash-lsb, Cover image , Stego image, SteganographyAbstract
In the latest, digital images are frequently used for storage, communication, medical imaging, etc. Such images possibly involve private data, which accordingly handed an important role to information security. Image encryption and steganography are two widely used techniques for providing information security. Cryptography is the technique of protecting information by encryption and decryption. In steganography, the message is inserted in an image with changes entitled a cover image. The principal purpose of the study is to improve the current secure data communication techniques, by combining cryptography with steganography. Steganography and cryptography are two examples of the multiple methods used to guarantee secrecy and privacy throughout data communication. The suggested approach achieves encryption and decryption utilizing chaotic encryption technique and employing hash-least significant bit (HLSB) as steganography which is a significant method of embedding data bits in LSB bits of RGB pixels of the cover image. The suggested image encryption method is validated by experimental results to be highly secure and resistant to a variety of attacks. Additionally, compared to several conventional picture encryption techniques, it offers higher performance. Peak signal-to-noise ratio (PSNR) and mean square error (MSE)calculations are used to provide security evaluations. PSNR is infinite and MSE is 0 for a secret image. PSNR and MSE for the cover image are 65 and 0.02 dB respectively. The results of this research reveal a high level of similarities between stego and cover images, and between recovered and secret images, as seen in the histogram analysis of secret images. These techniques are accomplished effectively by using the MATLAB program.
References
M. H. Abood and Z. K. Taha, “Secure and hidden text using aes cryptography and lsb steganography,” J. Eng. Sci. Technol., vol. 14, no. 3, pp. 1434–1450, 2019.
M. H. Abood, “An efficient image cryptography using hash-LSB steganography with RC4 and pixel shuffling encryption algorithms,” 2017 Annu. Conf. New Trends Inf. Commun. Technol. Appl. NTICT 2017, no. March 2017, pp. 86–90, 2017, doi: 10.1109/NTICT.2017.7976154.
J. N. Shehab, H. A. Abdulkadhim, and T. F. H. Al-Tameemi, “Robust large image steganography using lsb algorithm and 5d hyper-chaotic system,” Bull. Electr. Eng. Informatics, vol. 10, no. 2, pp. 689–698, 2021, doi: 10.11591/eei.v10i2.2747. DOI: https://doi.org/10.11591/eei.v10i2.2747
A. S. Al Najjar, “Implementation Color-Images Cryptography Using RSA Algorithm,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 7, no. 11, p. 181, 2017, doi: 10.23956/ijarcsse.v7i11.500. DOI: https://doi.org/10.23956/ijarcsse.v7i11.500
N. I. R. Yassin, “D Igital I Mage D Ata H Iding,” vol. 08, no. 03, pp. 242–255, 2022.
A. Jan, S. A. Parah, M. Hussan, and B. A. Malik, “Double layer security using crypto-stego techniques: a comprehensive review,” Health Technol. (Berl)., vol. 12, no. 1, pp. 9–31, 2022, doi: 10.1007/s12553-021-00602-1. DOI: https://doi.org/10.1007/s12553-021-00602-1
K. U. Shahna and A. Mohamed, “A novel image encryption scheme using both pixel level and bit level permutation with chaotic map,” Appl. Soft Comput. J., vol. 90, p. 106162, 2020, doi: 10.1016/j.asoc.2020.106162. DOI: https://doi.org/10.1016/j.asoc.2020.106162
أ. ع. موسى and م. ح. عبود, “Telecommunication Of A Secure Data In Optical Fiber,” مجلة المنصور, vol. 72, no. 27, p. 119, 2017, doi: 10.36541/0231-000-027-009. DOI: https://doi.org/10.36541/0231-000-027-009
S. Saraireh, J. Al-Saraireh, Y. Al-Sbou, and M. Saraireh, “A hybrid text – Image security technique,” J. Theor. Appl. Inf. Technol., vol. 96, no. 9, pp. 2414–2422, 2018.
C. Paper, “Secure Image Steganography using Canny Magic LSB Substitution Method and Secure Image Steganography using Canny Magic LSB Substitution Method and HMAC Algorithm,” no. August, 2019.
E. J. Kusuma, C. A. Sari, E. H. Rachmawanto, and D. R. I. M. Setiadi, “A combination of inverted LSB, RSA, and arnold transformation to get secure and imperceptible image steganography,” J. ICT Res. Appl., vol. 12, no. 2, pp. 103–122, 2018, doi: 10.5614/itbj.ict.res.appl.2018.12.2.1. DOI: https://doi.org/10.5614/itbj.ict.res.appl.2018.12.2.1
M. C. Kasapbasi, “A New Chaotic Image Steganography Technique Based on Huffman Compression of Turkish Texts and Fractal Encryption with Post-Quantum Security,” IEEE Access, vol. 7, no. October, pp. 148495–148510, 2019, doi: 10.1109/ACCESS.2019.2946807. DOI: https://doi.org/10.1109/ACCESS.2019.2946807
M. Malathi, M. Rahul, N. Sathish Kumar, and R. Thamaraiselvan, “Enhanced image steganography using AES & SPIHT compression,” Proc. 2017 Int. Conf. Innov. Information, Embed. Commun. Syst. ICIIECS 2017, vol. 2018-Janua, no. March, pp. 1–5, 2018, doi: 10.1109/ICIIECS.2017.8276029. DOI: https://doi.org/10.1109/ICIIECS.2017.8276029
K. Tutuncu and B. Demirci, “Adaptive LSB steganography based on chaos theory and random distortion,” Adv. Electr. Comput. Eng., vol. 18, no. 3, pp. 15–22, 2018, doi: 10.4316/AECE.2018.03003. DOI: https://doi.org/10.4316/AECE.2018.03003
S. D. Muyco and A. A. Hernandez, “Least significant bit hash algorithm for digital image watermarking authentication,” ACM Int. Conf. Proceeding Ser., no. April, pp. 150–154, 2019, doi: 10.1145/3330482.3330523. DOI: https://doi.org/10.1145/3330482.3330523
M. M-lsb-sm, “Color Image Steganography using Cryptography and Magic LSB Substitution Color Image Steganography using Cryptography and Magic LSB Substitution Method ( M-LSB-SM ),” no. July, 2019.
N. Kar, M. A. A. A. Aman, K. Mandal, and B. Bhattacharya, “Chaos-based video steganography,” ICIT 2017 - 8th Int. Conf. Inf. Technol. Proc., pp. 482–487, 2017, doi: 10.1109/ICITECH.2017.8080046. DOI: https://doi.org/10.1109/ICITECH.2017.8080046
S. D. Muyco and A. A. Hernandez, “A modified hash based least significant bits algorithm for steganography,” ACM Int. Conf. Proceeding Ser., no. July, pp. 215–220, 2019, doi: 10.1145/3335484.3335514. DOI: https://doi.org/10.1145/3335484.3335514
A. D. Putri Ariyanto, E. H. Rachmawanto, D. R. Ignatius Moses Setiadi, and C. A. Sari, “Performance Analysis of LSB Image Steganography Combined with Blowfish-RC4 Encryption in Various File Extensions,” Proc. 2019 4th Int. Conf. Informatics Comput. ICIC 2019, no. March 2020, 2019, doi: 10.1109/ICIC47613.2019.8985848. DOI: https://doi.org/10.1109/ICIC47613.2019.8985848
A. A.S, “High Security Cryptographic Technique Using Steganography and Chaotic Image Encryption,” IOSR J. Comput. Eng., vol. 12, no. 5, pp. 49–54, 2013, doi: 10.9790/0661-1254954. DOI: https://doi.org/10.9790/0661-1254954
J. Oravec, L. Ovsenik, and J. Papaj, “An image encryption algorithm using logistic map with plaintext-related parameter values,” Entropy, vol. 23, no. 11, 2021, doi: 10.3390/e23111373. DOI: https://doi.org/10.3390/e23111373
M. H. Abood, “Steganography with RC4 and Pixel Shuffling Encryption Algorithms,” no. March, pp. 7–9, 2017. DOI: https://doi.org/10.1109/NTICT.2017.7976154
J. C .Yen., and J. I. Guo, ,”A new image encryption algorithm and its VLSI architecture”. In IEEE Workshop on Signal Processing Systems, SiPS 99. Design and Implementation ,Cat. No. 99TH8461,pp. 430- 437, 1999.
P. R. Deshmukh and B. Rahangdale, “Hash Based Least Significant Bit Technique For Video Steganography”, Int. Journal of Engineering Research and Applications, vol. 4, no. 1, pp. 44–49, January 2014.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 May H. Abood, Sarah W. Abdulmajeed

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Deprecated: json_decode(): Passing null to parameter #1 ($json) of type string is deprecated in /var/www/vhosts/ijser.aliraqia.edu.iq/httpdocs/plugins/generic/citations/CitationsPlugin.inc.php on line 49







