Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.4.35

Combining Encryption and Preservation in Information Security to Secure Sending a Message  

Nooh, Sameer (Department of Computer Science, Tabuk University)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.4, 2022 , pp. 285-291 More about this Journal
Abstract
With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.
Keywords
Information Security; Encryption; Inform-ation Technology; Steganography; Sending Message;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Zinaly Elham and Naghipour Avaz, Audio Steganography to Protect the Confidential Information: A Survey, International Journal of Computer Applications. - July 2017. - pp. 22-29.
2 Hussein, Abdul Amir Khalaf. Encryption Methods for Beginners, Amman: Dar Wael for Publishing and Distribution, 2010.
3 Al-Hamami, Alaa Hussein and Al-Ani, Saad Abdel-Aziz. Information Security Technology and Protection Systems, Amman: Dar Wael for Publishing and Distribution, 2007.
4 Andrews Chinchu Elza and Joseph Iwin Thanakumar, An analysis of various stegnographic algoritms, International Journal of Advanced Research in Electronics and Communication Engineering (IJAREC) .Volume 2, Issue 2, February 2013.
5 Felicisimo V. W., Bobby D. G. and Bartolome T. T. Modified AES Algorithm using Multiple S-Boxes". Proceedings of the Second International Conference on Electrical, Electronics, Computer Engineering and their Applications (EECEA) , Manila, Philippine, 2015.
6 Jeffrey A Bloom, Digital watermarking and steganography, Morgan Kaufmann publications, 2008.
7 Joye M., Cryptographic Hardware and Embedded Systems-CHES, New York, 2004.
8 Kobayashi L, Furuie S and Barreto P, Providing Integrity and Authenticity in DICOM Images: A novel Approach, IEEE Transactions on Information Technology in Biomedicine. - 2009. - pp. pp. 582-589.
9 Koduri Nani, Information Security through Image Steganography Using Least Significant Bit Algorithm, London: University of East London, 2011.
10 Sumathy V. and Navaneethan C., Enhanced AES Algorithm for Strong Encryption, International Journal of Advances in Engineering& Technology (IJAET). - 2012.
11 Whitman M E and Mattord H J, Principles of information security, Thomson, 2012.
12 Fouad Mohamed M, Enhancing the Imperceptibility of Image Steganography for Information, The Federated Conference on Computer Science and Information Systems, 2017. - pp. pp. 545-548.
13 Hasso, Shahd. Hiding compressed texts in an audio file, Al-Rafidain Journal of Computer Science and Mathematics, Volume (10) Issue (1), (a special issue of the proceedings of the Fifth Scientific Conference in Information Technology). - 2013 .
14 Kandilji, Amer Ibrahim et al. Information and Communication Networks, Amman: Dar Al Masirah, 2012 .
15 Abdullah Sadoon Hussein, Steganography Methods and some application (The hidden Secret data in Image) , Mosul : University of Mosul, 2009.
16 Stallings W., Cryptography and Network Security: Principles and Practice : Prentice Hall, 2013.
17 Kevin L., Advanced Encryption Standard (AES) Selection Process- How Rijndael Won, MIDN 1, 2015.