Two-level hiding an encrypted image

Faten H. MohammedSediq Al-Kadei

Abstract


Encryption and hiding images are becoming a hot research area and a broad prospect for application. This article uses a secure algorithm with Low Significant Bit method to hide an encrypted high-resolution color bitmap image in two selectively color images (i.e., two cover images). The paper introduces a two-level hiding encrypted image using MATLAB-GUI programming language. In the beginning, with a key image using XOR bit operation, the original RGB image is encrypted. After that, the encrypted image is hidden into the first cover image. The cover image is then hidden into another cover to make the secret image safer without changing the perceptual quality for both covers. Then, the algorithm is tested on many bitmap images, which can be an important image, fingerprint image, samples of secret medicine, or bank account pattern. The correlation histograms demonstrate a high correlation for all encrypted images. The PSNR is used to find steganography quality for the two cover images after hiding the secret image showing a high quality for the two levels of hiding operation


Keywords


Cryptography; Fractal image; Hiding image; Image decryption; Image encryption; Steganography

Full Text:

PDF

References


REFERENCES

S. Bhallamudi, “Image Steganography,” in EE7150 – Digital Image Processing, 2015, pp. 1–17.

Z. Alqadi, B. Zahran, Q. Jaber, B. Ayyoub, J. Al-Azzeh, and A. Sharadqh, “Proposed Implementation Method to Improve LSB Efficiency,” Int. J. Comput. Sci. Mob. Comput., vol. 8, no. 3, pp. 306–319, 2019.

M. G. Anchal Chander Lekha, “Hiding an Image Data into Video Stenography Using Different Algorithm and MATLAB: A Review,” Int. J. Comput. Sci. Trends Technol., vol. 6, no. 2, pp. 12–16, 2018.

A. B. M.S. Bouridah, T. Bouden, “Fractional Chaos Synchronization for Color Image Encryption,” in Third International Conference on Technological Advances in Electrical Engineering (ICTAEE’18.), 2018, pp. 1–8.

K. D. Patel and S. Belani, “Image encryption using different techniques: A review,” Int. J. Emerg. Technol. Adv. Eng., vol. 1, no. 1, pp. 30–34, 2011.

R. Kaur and E. K. Singh, “Image encryption techniques: a selected review,” J. Comput. Eng., vol. 9, no. 6, pp. 80–83, 2013.

A. Nag et al., “Image encryption using affine transform and XOR operation,” in 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, 2011, pp. 309–312.

R. M. Rad, A. Attar, and R. E. Atani, “A new fast and simple image encryption algorithm using scan patterns and XOR,” Int. J. Signal Process. Image Process. Pattern Recognit., vol. 6, no. 5, pp. 275–290, 2013.




DOI: http://doi.org/10.11591/ijeecs.v18.i2.pp961-969
Total views : 104 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

shopify stats IJEECS visitor statistics