Transmitting Security Enforcement By Text Encrypting and Image Hiding Technique using Combined Encrypt/Hide Keys
Author(s) -
Mohammed J. Khami
Publication year - 2018
Publication title -
international journal of engineering and manufacturing
Language(s) - English
Resource type - Journals
eISSN - 2306-5982
pISSN - 2305-3631
DOI - 10.5815/ijem.2018.01.01
Subject(s) - encryption , steganography , computer science , cryptography , least significant bit , computer security , key (lock) , steganography tools , public key cryptography , plain text , information hiding , theoretical computer science , data mining , image (mathematics) , artificial intelligence , operating system
Comparative study of cryptography and steganography techniques shows that they have some strong and weak points when they used alone. But as we know from soft computing techniques (neural, genetic, and fuzzy computing), that when combining (hybridizing), more than one techniques, by the suitable way to do a job, the outcome will be a better technique with more strong points and less weak points. Work of this paper represents an attempt to prove that combining cryptography with steganography techniques will result in hard transmitting system to break and thus enforcing security issues of secret text data transmitting over public channels. Matlab programs are written to encrypt plain text secret information following AES encrypt/decrypt algorithm with a key of 128 bits long and then hide/extract the text according to LSB insertion method with a key of 128 bits long too. System tests show that both techniques enforce each other and private data transmitting become more secure.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom