A Modified RSA Algorithm for Hiding Text in Colored Images with Random Pixel Selection

  • Sinan A. Naji
  • Hatem N. Mohaisen
  • Salman H. Omran
Palabras clave: RSA, LSB, Steganography, Cryptography, Random Pixel Selec- tion

Resumen

This study introduces a combination of two techniques: a modified RSA cryp- tography and image-based steganography to improve the overall system’s security level. The system comprises three main steps: message encryption, random traversing path generation, and image-based steganography. We pro- pose to use the addition of factor F along with standard RSA to the make the cryptanalysis task more difficult. Furthermore, LSB image-based steganog- raphy technique is used for hiding the message. However, hiding data on a systematic basis subjects the algorithm to many steganalysis techniques. As a result, the attacker is capable of detecting the inclusion of a secret message within the image. As such, it is important to have an additional level of securi- ty to enhance the protection of the data. This study proposes to use of random pixel selection. For brute-force attack, the attacker not only needs to find the pixels holding the secret bits, but also must determine the appropriate combi- nation of bits in order to reconstruct the hidden data. Compared to standard RSA and LSB techniques, the proposed system achieves a significant security improvement with high image quality.

Biografía del autor/a

Sinan A. Naji
Department of Postgraduate Studies, University of Information Tech- nology and Communications, Baghdad, Iraq
Hatem N. Mohaisen
Ministry of Higher Education and Scientific Research, Minister’s Office, Baghdad, Iraq.
Salman H. Omran
Ministry of Higher Education and Scientific Research, Private Higher Education Directorate, Baghdad, Iraq

Citas

N. Efford, Digital image processing: a practical introduction using java (with CD-ROM): Addison-Wesley Longman Publishing Co., Inc., 2000.

K. Joshi, K. Puniani, and R. Yadav, “A Review on Different Image Steganography Techniques,” Digital Image Processing, vol. 8, no. 6, pp. 179-186, 2016.

M. Mishra, G. Tiwari, and A. K. Yadav, “Secret communica- tion using public key steganography,” in International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), 2014, pp. 1-5.

V. Pachghare, Cryptography and information security: PHI Learning Pvt. Ltd., 2015.

H. L. Hussein, A. A. Abbass, S. A. Naji, S. Al-augby, and J. H. Lafta, “Hiding text in gray image using mapping technique,” in Jour- nal of Physics: Conference Series, 2018, pp. 012032.

A. Y. Tuama, M. A. Mohamed, A. Muhammed, and M. H. Zurina, “Randomized Pixel Selection for Enhancing LSB Algorithm Security against Brute-Force Attack,” Journal of Mathematics and Statistics vol. 13, no. (2), pp. 127-138, 2017.

A. Tiwari, S. R. Yadav, and N. Mittal, “A review on different image steganography techniques,” International Journal of Engineer- ing and Innovative Technology (IJEIT) Volume, vol. 3, pp. 19-23, 2014.

A. Baby, and H. Krishnan, “Combined Strength of Steganog- raphy and Cryptography-A Literature Survey,” International Journal of Advanced Research in Computer Science, vol. 8, no. 3, 2017.

S. Almuhammadi, and A. Al-Shaaby, “A survey on recent ap- proaches combining cryptography and steganography,” Computer Science Information Technology (CS IT), 2017.

G. Swain, and S. K. Lenka, “A novel steganography technique by mapping words with LSB array,” International Journal of Signal and Imaging Systems Engineering, vol. 8, no. 1-2, pp. 115-122, 2015. [11] A. K. Hussain, “A Modified RSA Algorithm for Security En- hancement and Redundant Messages Elimination Using K-Nearest Neighbor Algorithm,” IJISET-International Journal of Innovative Science, Engineering & Technology, vol. 2, no. 1, pp. 858-862, 2015. [12] A. Senarathne, and K. De Zoysa, “ILSB: Indexing with Least Significant Bit Algorithm for Effective Data Hiding,” International Journal of Computer Applications vol. 161, no. 5, 2014.

A. H. Al-Hamami, and I. A. Aldariseh, “Enhanced method for RSA cryptosystem algorithm,” in Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Con- ference on, 2012, pp. 402-408.

R. S. Ankit Uppal, Renuka ngapal, Aakash gupta, “Merging Cryptography and Steganography Combination of Cryptography: RC6 Enhanced Ciphering and Steganography: jpeg,” International Journal of Advanced Computational Engineering and Networking, vol. 2, no. 10, Oct. 2014.

S. Saraireh, “A Secure Data Communication system using cryptography and steganography,” International Journal of Comput- er Networks & Communications, vol. 5, no. 3, pp. 125, 2013.

M. E. Saleh, A. A. Aly, and F. A. Omara, “Data Security Using Cryptography and Steganography Techniques,” IJACSA) Interna- tional Journal of Advanced Computer Science and Applications, vol. 7, no. 6, pp. 390-397, 2016.

A. A. Pujari;, and S. S. Shinde, “Data Security using Cryptog- raphy and Steganography,” IOSR Journal of Computer Engineering, vol. 18, no. 4, 2016.

A. Kumar, and R. Sharma, “A secure image steganography based on RSA algorithm and hash-LSB Technique,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 7, 2013.

S. D. M. Satar, N. A. Hamid, F. Ghazali, R. Muda, and M. Mamat, “A New Model for Hiding Text in an Image Using Logical Connective,” International Journal of Multimedia and Ubiquitous Engineering, vol. 10, no. 6, pp. 195-202, 2015.

A. Dhamija, and V. Dhaka, “A novel cryptographic and ste- ganographic approach for secure cloud data migration,” in 2015 In- ternational Conference on Green Computing and Internet of Things (ICGCIoT), 2015, pp. 346-351.

B. Pillai, M. Mounika, P. J. Rao, and P. Sriram, “Image steg- anography method using k-means clustering and encryption tech- niques,” in 2016 International Conference on Advances in Com- puting, Communications and Informatics (ICACCI), 2016, pp. 1206-1211.

R. Indrayani, H. A. Nugroho, R. Hidayat, and I. Pratama, “In- creasing the security of mp3 steganography using AES Encryption and MD5 hash function,” in 2016 2nd International Conference on Science and Technology-Computer (ICST), 2016, pp. 129-132.

N. Patel, and S. Meena, “LSB based image steganography us- ing dynamic key cryptography,” in 2016 International Conference on Emerging Trends in Communication Technologies (ETCT), 2016, pp. 1-5.

S. Jindal, and N. Kaur, “Digital image steganography survey and analysis of current methods,” International Journal of Computer Science and Information Technology & Security, vol. 6, pp. 10-13, 2016.

K. U. Singh, “A Survey on Image Steganography Techniques,” International Journal of Computer Applications, vol. 97, no. 18, 2014. [26] B. Li;, J. He;, J. Huang;, and Y. Q. Shi;, “A Survey on Image Steganography and Steganalysis,” Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, 2011.

A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Sig- nal processing, vol. 90, no. 3, pp. 727-752, 2010.

D. Lehmer, “Proceedings of the Second Symposium on Large-Scale Digital Computing Machinery,” Harvard University Press, Cambridge, Mass, 1951.

R. Zainuddin, S. Naji, and J. Al-Jaafar, “Suppressing False Negatives in Skin Segmentation,” in International Conference on Fu- ture Generation Information Technology, 2010, pp. 136-144.

J. Rani, and T. A. Khan, “Performance Optimized DCT Do- main Watermarking Technique with JPEG,” International Journal of innovative Technology and Exploring Engineering, vol. 4, no. 2, 2014.

K. Rao, and H. Wu, “Structural similarity based image quality assessment,” Digital Video image quality and perceptual coding, pp. 261-278: CRC Press, 2005.

Publicado
2019-08-03
Cómo citar
A. Naji, S., N. Mohaisen, H., & H. Omran, S. (2019). A Modified RSA Algorithm for Hiding Text in Colored Images with Random Pixel Selection. Opción, 35, 749-768. Recuperado a partir de https://www.produccioncientificaluz.org/index.php/opcion/article/view/31627