TOP CITED ARTICLES IN 2019 The International Journal of Network Security & Its Applications (IJNSA) ISSN 0974 - 9330 (Online); 0975 - 2307 (Print) http://airccse.org/journal/ijnsa.html
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION Huda H.Al.Ghuraify, Ali A.Al-Bakry, Ahmad T. Al-Jayashi, al-furat al-awsat university, Iraq
ABSTRACT Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
KEYWORDS Computer & Network Security, Intrusion Detection, Intrusion Detection System, Genetic Algorithm, KDD Cup 1999 Dataset. For More Details:http://aircconline.com/ijnsa/V11N2/11219ijnsa02.pdf Abstract URL: http://aircconline.com/abstract/ijnsa/v11n2/11219ijnsa02.html Volume Link:http://airccse.org/journal/jnsa19_current.html
REFERENCES [1] N. Hamid, A. Yahya, R. B. Ahmad, and O. M. Al-Qershi, (2018) “Image in image Steganography Technique based on Arnold Transform and LSB Algorithms,” Int. J. Comput. Sci. Secur., vol. 6, no. 3, pp. 32–39. [2] A. Sharma, M. Poriye, and V. Kumar, (2017) “A Secure Steganography Technique Using MSB,” Int. J. Emerg. Res. Manag. &Technology, vol. 6, no. 6, pp. 208–214. [3] J. M. ud din lone Amit Chaturvedi, (2018) “An Analysis on LSB Image Steganography with Colour Image as Cover,” Int. J. Comput. Appl., vol. 182, no. 4, pp. 23–28. [4] H. N. Kamel, M. A. Alia, A. Saeq, and E. A. Maria, (2017) “A S ECURE E- M EDICAL E XEMPTION S YSTEM ( E-MES ): J ORDAN C ASE,” Int. J. Netw. Secur. Its Appl., vol. 9, no. 2,pp. 13–19. [5] M. M. Hashim, M. Shafry, and M. Rahim,( 2018) “A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE,” J. Theor. Appl. Inf. Technol., vol. 96, no. 4, pp. 956–977. [6] D. L. K. Gunda Sai Charan , Nithin Kumar S S V , Karthikeyan B , Vaithiyanathan V, (2015) “A Novel LSB Based Image Steganography With Multi-Level Encryption,” IEEE Spons. 2nd Int. Conf. Innov. Inf. Embed. Commun. Syst. ICIIECS’15. [7] S. C. Dinde and S. B. Patil, (2014) "DWT Domain Data Encryption with Asymmetric key Cryptography," vol. 3, no. 8, pp. 7744-7747. [8] I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, (2018) “Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research,” Neurocomputing. [9] F. M. Shelke, A. A. Dongre, and P. D. Soni, (2014) “Comparison of different techniques for Steganography in images,” Int. J. Appl. or Innov. Eng. Manag., vol. 3, no. 2, pp. 171–176. [10] S. A. Al-taweel, M. H. Al-hada, and A. M. Nasser, (2018) “Image in image Steganography Technique based on Arnold Transform and LSB Algorithms,” Int. J. Comput. Appl., vol. 181, no. 10, pp. 32–39. [11] K. A. Al-afandy, O. S. Faragallah, and A. Elmhalawy, (2016) “High Security Data Hiding Using Image Cropping and LSB Least Significant Bit Steganography,” IEEE, pp. 400–404. [12] Y. P. Astuti, D. R. I. M. Setiadi, E. H. Rachmawanto, and C. A. Sari, (2018) “Simple and secure image steganography using LSB and triple XOR operation on MSB,” in International Conference on Information and Communications Technology (ICOIACT) Simple, pp. 191–195. [13] S. M. Klim, (2017) “SELECTED LEAST SIGNIFICANT BIT APPROACH FOR HIDING INFORMATION INSIDE COLOR IMAGE STEGANOGRAPHY BY” J. Eng. Sustain. Dev., vol. 21, no. 01, pp. 74–88. [14] M. J. Hussain,( 2016) “Secure Steganography for Digital Images,” Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 6, pp. 45– 59. [15] V. Shah, (2017)“Sparse Encoded Matrix based Steganography algorithm Vipul Shah,” Int. Res. J. Eng. Technol., vol. 4, no. 4, pp. 1996–1998. [16] K. Joshi and R. Yadav, (2015) “A new LSB-S image steganography method blend with Cryptography for secret communication,” Proc. 3rd Int. Conf. Image Inf. Process. ICIIP, pp. 86–90. [17] N. K. Jumaa, (2017) “Image Steganography : Review and Comparison,” ResearchGate". [18] vidhu kiran dutt Shikha, (2014) “Steganography: The Art of Hiding Text in Image using Matlab,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 9, pp. 822–828. [19] D. A. A. Sabri and M. J. Mohsin, (2015) “A New Algorithm for a Steganography System,” Eng. &Tech.Journal, vol.
33, no. 8, pp. 1955–1970. [20] “https://ae01.alicdn.com/kf/HTB12Cu7NpXXXXaBaXXXq6xXFXXXX/40.jpg_640x640.jpg.” . [21] “https://jefflynchdev.files.wordpress.com/2008/12/hill_country_landscape_large.jpg [22] “https://encryptedtbn0.gstatic.com/images?q=tbn:ANd9GcRMmv9KbtAnusL1uh2GlGVat_7mesvJ15Amlr_khloLa3el0 IgA.” . [23] “https://encryptedtbn0.gstatic.com/images?q=tbn:ANd9GcSCdBurtIFUQj7lB12ep57INLBTbDc9BkqmogJM2G6L541 EeZHb.” . [24] A. M. Al-shatnawi, (2012) “A New Method in Image Steganography with Improved Image Quality,” Appl. Math. Sci., vol. 6, no. 79, pp. 3907–3915. [25] M. C. Pallavi Das, Satish Chandra Kushwaha, (2015) “MULTIPLE EMBEDDING SECRET KEY IMAGE STEGANOGRAPHY USING LSB SUBSTITUTION AND ARNOLD TRANSFORM,” IEEE Spons. 2ND Int. Conf. Electron. Commun. Syst., pp. 845–849. [26] P. Mathur and S. Adhikari, (2017) “DATA HIDING IN DIGITAL IMAGES USING STAGNOGRAPHY PARADIGM : STATE OF THE ART,” Int. J. Adv. Electron. Comput. Sci., vol. 4, no. 2, pp. 98–102. [27] K. Silpa and S. A. Mastani,( 2012) “COMPARISON OF IMAGE QUALITY METRICS,” Int. J. Eng. Res. Technol., vol. 1, no. 4, pp. 1–6. [28] Y. Zhang, J. Jiang, Y. Zha, H. Zhang, and S. Zhao, (2013) “Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images,” Int. J. Intell. Sci., no. 3, pp. 77–85.
AUTHORS Huda .H. Al.ghuraify received her bachelor degree in communication engineering from Engineering technical college , najaf , Iraq in 2010.she is currently pursuing the MSC degree at Engineering technical college, ALFurat AL-Awsat University Her Research interests include communication security and image steganography.
Dr .Ali A .Al-bakry was born in Baby loon /Iraq on June 3, 1959. He received his B.Sc and M.Sc.in electrical engineering department, college of engineering, university of Baghdad, Baghdad, Iraq, in 1982 and in 1994 respectively and his PhD degrees in electrical engineering from University of Technology (UoT), Baghdad, Iraq, in 2006.Since 2004 he is electrical engineering professor and a Dean of Al-Najaf Engineering Technical College, Al-Furat Al-Awsat Technical University. His current research interests include high voltage engineering Techniques, electrical power system stability and intelligent optimization, electric machine drive, renewable energy, intelligent control techniques, smart and adaptive control in electric power system. Dr. Ahmad T. Al-jayashi received his bachelor in electrical engineering from Tikret university. received his MSC in electrical engineering from university of baghdad and phd from electrical and computer department of michigan state university.he has more than 29 papers published in different valuable journals and conferences. He is currently working as assistance dean of al najaf engineering technical collegeAL-Furat AL-AwsatUniversity. his interested control theory,advance image processing ,security of communication system,robotics manipulation systems.he had been chosen as a reviewer for many journals and conferences.
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON IMAN1 SUPER COMPUTER Ahmad Bany Doumi and Mohammad Qatawneh, University of Jordan, Amman-Jordan
ABSTRACT Distributed security is an evolving sub-domain of information and network security. Security applications play a serious role when data exchanging, different volumes of data should be transferred from one site to another safely and at high speed. In this paper, the parallel International Data Encryption Algorithm (IDEA) which is one of the security applications is implemented and evaluated in terms of running time, speedup, and efficiency. The parallel IDEA has been implemented using message passing interface (MPI) library, and the results have been conducted using IMAN1 Supercomputer, where a set of simulation runs carried out on different data sizes to define the best number of processor which can be used to manipulate these data sizes and to build a visualization about the processor number that can be used while the size of data increased. The experimental results show a good performance by reducing the running time, and increasing speed up of encryption and decryption processes for parallel IDEA when the number of processors ranges from 2 to 8 with achieved efficiency 97% to 83% respectively.
KEYWORDS International Data Encryption Algorithm (IDEA); Plain text; Encrypted data; MPI. For More Details:http://aircconline.com/ijnsa/V11N1/11119ijnsa04.pdf Abstract Url : http://aircconline.com/abstract/ijnsa/v11n1/11119ijnsa04.html Volume Link : http://airccse.org/journal/jnsa19_current.html
REFERENCES [1] Leong, M.P., Cheung, O.Y., Tsoi, K.H. and Leong, P.H.W., 2000. A bit-serial implementation of the international data encryption algorithm IDEA. In Field-Programmable Custom Computing Machines, 2000 IEEE Symposium on (pp. 122-131). IEEE. [2] Basu, S., 2011. International Data Encryption Algorithm (Idea)–A Typical Illustration. Journal of global research in Computer Science, 2(7), pp.116-118. [3] Patil, S. and Bhusari, V., 2014. An enhancement in international data encryption algorithm for increasing security. Intl. J. of Application or Innovation in Engineering & Management, 3(8), pp.64-70. [4] Almasri, O. and Jani, H.M., 2013. Introducing an Encryption Algorithm based on IDEA. International Journal of Science and Research (IJSR), India, 2(9). [5] Lai, X. and Massey, J.L., 1990, May. A proposal for a new block encryption standard. In Workshop on the Theory and Application of of Cryptographic Techniques (pp. 389-404). Springer, Berlin, Heidelberg. [6] Beletskyy, V. and Burak, D., 2004, June. Parallelization of the IDEA Algorithm. In International Conference on Computational Science (pp. 635-638). Springer, Berlin, Heidelberg. [7] Saadeh, M., Saadeh, H. and Qatawneh, M., 2016. Performance Evaluation of Parallel Sorting Algorithms on IMAN1 Supercomputer. International Journal of Advanced Science and Technology, 95, pp.57-72. [8] Mohammed, Q., 2005. Embedding linear array network into the tree-hypercube network. European Journal of Scientific Research, 10(2), pp.72-76. [9] Mohammd Qatawneh, Ahmad Alamoush, and Ja’far Alqatawna, 2015. Section Based Hex-Cell Routing Algorithm (SBHCR). International Journal of Computer Networks & Communications (IJCNC), 7(1). [10] Qatawneh, M., 2011. Multilayer Hex-Cells: A New Class of Hex-Cell Interconnection Networks for Massively Parallel Systems. International journal of Communications, Network and System Sciences, 4(11), p.704. [11] Qatawneh, M., 2011. Embedding Binary Tree and Bus into Hex-Cell Interconnection Network. Journal of American Science, 7(12), p.0. [12] Mohammad, Q. and Khattab, H., 2015. New Routing Algorithm for Hex-Cell Network. International Journal of Future Generation Communication and Networking, 8(2), pp.295-306. [13] Qatawneh, M., 2016. New Efficient Algorithm for Mapping Linear Array into Hex Cell Network. International Journal of Advanced Science and Technology, 90, pp.9-14. [14] Mathur, M. and Kesarwani, A., 2013. Comparison between Des, 3des, Rc2, Rc6, Blowfish And Aes. In Proceedings of National Conference on New Horizons in IT-NCNHIT (Vol. 3, pp. 143-148). [15] Mandal, A.K., Parakash, C. and Tiwari, A., 2012, March. Performance evaluation of cryptographic algorithms: DES and AES. In Electrical, Electronics and Computer Science (SCEECS), 2012 IEEE Students' Conference on (pp. 1-5). IEEE. [16] Asassfeh, M.R., Qatawneh, M. and AL-Azzeh, F.M., 2018. PERFORMANCE EVALUATION OF BLOWFISH ALGORITHM ON SUPERCOMPUTER IMAN1.International Journal of Computer Networks & Communications (IJCNC), 10(2). [17] Burak, D., 2015. Parallelization of an encryption algorithm based on a spatiotemporal chaotic system and a chaotic neural network. Procedia Computer Science, 51, pp.2888-2892.
AUTHORS Ahmad Bany Doumi, is an admitted PhD candidate in Computer Science in University of Jordan, he received his Master degree in computer science from Yarmouk University, his research interests in network security and parallel computing. Mohammad Qatawneh, is a Professor at computer science department, the University of Jordan. He received his Ph.D. in computer engineering from Kiev University in 1996. Dr. Qatawneh published several papers in the areas of parallel algorithms, networks and embedding systems. His research interests include parallel computing, embedding system, and network security.