Abstract

This study presents a two principles, Cryptography and Steganography, each tow methods work separately from the other to ensure a secure content. We are developed an algorithm to increase the safety and reliability of the copyrights of the images or books (etc.) that published on the internet by providing a watermark image (as logo) hiding inside the original file that we want product it. Firstly reading image (the logo image), convert it to binary and encrypted it by using EX-OR with a secret key and embedding it inside a gray image in the LSB (in the 1<sup>st</sup>) and hiding first key in the 2<sup>nd</sup> bit and the second key in the 3<sup>rd</sup> bit, then we embedding them in the LSB of Original image in RGB to be protected. The two secret keys, first one as an encryption key and the second key using as signature (data) that have been taken from the cover image (original) to make sure the reliability of the image transmitted via the Internet.

Highlights

  • IntroductionThe development in computer technology and communication to increase the need to provide protection and security for files and information stored in it from tampering with or changed by thieves and hackers (Unauthorized), there is a need to provide a means of security data, including cryptography, which serves to provide protection for the storage of data by changing the shape of or the content of the information is not clear manner using a secret key.Due to the increased use of the World Wide Web has become difficult to protect such information private and that in the formula sends to doubt the intruder as a result of the imposition of several restrictions to prevent the use of encryption across the network led to the emergence of another way in the development of security data which is aware of hiding information and the aim is hackers knowledge of hidden information, but to remove doubt originally the existence of this information and especially thing in hiding technique they keep pace with modern technology and can be used in all media of computer images and text and audio and video network packets.The scientific data encryption and steganography that represented on hidden writing a watermark and ways to provide security and confidentiality of the data transmitted, where they work together to encode the message transmitted and hide the existence of a connection between the two parties.The researcher (Ali, 2010) has the hidden text within a color image of the type (BMP) based on the least significant bit where it was hide in first-third of the image and the lowest and the least amount of distortion on the image data.And researcher (Saurabh and Gaurav, 2010) the proposal watermark technology that distinguish characters used to ensure the integrity of the security hidden data in the files.We can hide the information in different ways in the digital images have been in this study adoption of spatial domain by using Least Significant Bit (LSB) has been used type of image files (BMP, JPEG and TIFF) as a cover and the pictures represent watermark

  • We embedding that encrypted image (W′′) and the first key and the second key to the Second watermark gray scale image to obtain (W2′); we embedding cover 1 (W2′) to cover 2 color cover (c)

  • For the purpose of measuring the quality of the image containing the resulting watermark the results were as shown in the Fig. 8 with Table 1 and 2 and (1) Fig. 9 with Table 3 and 4 which describes the process of hiding and retrieving the watermark and Table 1 to 4 shows the values of (MSE, Peak Signal To Noise Ratio (PSNR)) of the previous forms, respectively (For all the image in that size the (2) Normalization Correlation (NC) = 1)

Read more

Summary

Introduction

The development in computer technology and communication to increase the need to provide protection and security for files and information stored in it from tampering with or changed by thieves and hackers (Unauthorized), there is a need to provide a means of security data, including cryptography, which serves to provide protection for the storage of data by changing the shape of or the content of the information is not clear manner using a secret key.Due to the increased use of the World Wide Web has become difficult to protect such information private and that in the formula sends to doubt the intruder as a result of the imposition of several restrictions to prevent the use of encryption across the network led to the emergence of another way in the development of security data which is aware of hiding information and the aim is hackers knowledge of hidden information, but to remove doubt originally the existence of this information and especially thing in hiding technique they keep pace with modern technology and can be used in all media of computer images and text and audio and video network packets.The scientific data encryption and steganography that represented on hidden writing a watermark and ways to provide security and confidentiality of the data transmitted, where they work together to encode the message transmitted and hide the existence of a connection between the two parties.The researcher (Ali, 2010) has the hidden text within a color image of the type (BMP) based on the least significant bit where it was hide in first-third of the image and the lowest and the least amount of distortion on the image data.And researcher (Saurabh and Gaurav, 2010) the proposal watermark technology that distinguish characters used to ensure the integrity of the security hidden data in the files.We can hide the information in different ways in the digital images have been in this study adoption of spatial domain by using Least Significant Bit (LSB) has been used type of image files (BMP, JPEG and TIFF) as a cover and the pictures represent watermark. Due to the increased use of the World Wide Web has become difficult to protect such information private and that in the formula sends to doubt the intruder as a result of the imposition of several restrictions to prevent the use of encryption across the network led to the emergence of another way in the development of security data which is aware of hiding information and the aim is hackers knowledge of hidden information, but to remove doubt originally the existence of this information and especially thing in hiding technique they keep pace with modern technology and can be used in all media of computer images and text and audio and video network packets. The researcher (Ali, 2010) has the hidden text within a color image of the type (BMP) based on the least significant bit where it was hide in first-third of the image and the lowest and the least amount of distortion on the image data.

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.