Two Level Hiding an Encrypted Image

Faten Hassan Al-Kadei


Encryption and hiding image are becoming a hot research area and a broad prospect for application. Different Encryption and Cryptography technologies have been rapidly developed in recent years. Numerous methods of image cryptography and hiding have been proposed to protect image data confidentiality from unauthorized persons. This article uses a secure algorithm with Low Significant Bit method to hide an encrypted high-resolution color bitmap image (secret image) in two selectively color images (i.e. two cover images). The paper introduces a two-level hiding encrypted image using MATLAB-GUI programming language. It is a powerful support for data analysis and visualization tool designed for matrix and matrix operations. In the beginning, with a key image using XOR bit operation, the original RGB image is encrypted. After that, the encrypted image is hidden into the first cover image. The cover image is then hidden into another cover to make the secret image safer without changing the perceptual quality for both covers. Then, the algorithm is tested on many bitmap images which can be an important image, fingerprint image, samples of secret medicine or bank account pattern. The correlation histograms demonstrate high correlation for all encrypted images. The PSNR is used to find steganography quality for the two cover images after hiding the secret image showing a high quality for the two levels of hiding operation.


Fractal Image, Cryptography, Steganography, Image Encryption, Image Decryption, Hiding Image



S. Bhallamudi, “Image Steganography,” in EE7150 – Digital Image Processing, 2015, pp. 1–17.

Z. Alqadi, B. Zahran, Q. Jaber, B. Ayyoub, J. Al-Azzeh, and A. Sharadqh, “Proposed Implementation Method to Improve LSB Efficiency,” Int. J. Comput. Sci. Mob. Comput., vol. 8, no. 3, pp. 306–319, 2019.

M. G. Anchal Chander Lekha, “Hiding an Image Data into Video Stenography Using Different Algorithm and MATLAB: A Review,” Int. J. Comput. Sci. Trends Technol., vol. 6, no. 2, pp. 12–16, 2018.

A. B. M.S. Bouridah, T. Bouden, “Fractional Chaos Synchronization for Color Image Encryption,” in Third International Conference on Technological Advances in Electrical Engineering (ICTAEE’18.), 2018, pp. 1–8.

K. D. Patel and S. Belani, “Image encryption using different techniques: A review,” Int. J. Emerg. Technol. Adv. Eng., vol. 1, no. 1, pp. 30–34, 2011.

R. Kaur and E. K. Singh, “Image encryption techniques: a selected review,” J. Comput. Eng., vol. 9, no. 6, pp. 80–83, 2013.

A. Nag et al., “Image encryption using affine transform and XOR operation,” in 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, 2011, pp. 309–312.

R. M. Rad, A. Attar, and R. E. Atani, “A new fast and simple image encryption algorithm using scan patterns and XOR,” Int. J. Signal Process. Image Process. Pattern Recognit., vol. 6, no. 5, pp. 275–290, 2013.

Total views : 30 times


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

shopify stats IJEECS visitor statistics