ArticlePDF Available

Securing Message Steganography by using Modified LSB Method

Authors:

Abstract

Message steganography is one of the popular methods used to protect secret message. In this research paper a modified LSB method of message steganography will be introduced. The introduced method will use a complicated private key to protect the message from being hacked, the key will provide an excellent key space capable to resist hacking attacks, it will contain 6 values with a double data type. The private key will be used to divide the covering image into segments and divide the secret message into partitions; each message partition will be hidden in one image segment. The hiding and extracting processes will be implemented in a patch way, by inserting the binary version of the message partition in burst way and extracting the binary version of the message partition also in burst way. The proposed method will keep the quality of the stego image as in LSB method. The efficiency of the proposed method will be closed to the efficiency of LSB method. The proposed method will be implemented and tested using various images and various covering images, the obtained results will be analyzed to prove the advantages provided by the proposed method.
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 110
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320088X
IMPACT FACTOR: 7.056
IJCSMC, Vol. 12, Issue. 4, April 2023, pg.110 124
Securing Message Steganography
by using Modified LSB Method
Prof. Ziad Alqadi; Mohammad Al-Raqqad
Albalqa Applied University, Jordan Amman
DOI: https://doi.org/10.47760/ijcsmc.2023.v12i04.010
Abstract:
Message steganography is one of the popular methods used to protect secret message. In this research
paper a modified LSB method of message steganography will be introduced. The introduced method will
use a complicated private key to protect the message from being hacked, the key will provide an excellent
key space capable to resist hacking attacks, it will contain 6 values with a double data type. The private
key will be used to divide the covering image into segments and divide the secret message into partitions;
each message partition will be hidden in one image segment. The hiding and extracting processes will be
implemented in a patch way, by inserting the binary version of the message partition in burst way and
extracting the binary version of the message partition also in burst way. The proposed method will keep
the quality of the stego image as in LSB method. The efficiency of the proposed method will be closed to
the efficiency of LSB method.
The proposed method will be implemented and tested using various images and various covering images,
the obtained results will be analyzed to prove the advantages provided by the proposed method.
Keywords: Steganography, LSB, PK, covering image, stego image, image segment, message partition.
Introduction
Steganography [1-5] is the process of hiding secret information in another data which is called a covering data.
Steganography is one of the most popular and easiest methods of data protection, most methods based on least
significant bit (LSB) and LSB2 are not secure, and it is easy to hack the hidden message [37-43]. Digital color
image is the most convenient data which can be used as a covering media for the following reasons [6-15]:
- The color image [50-60] can be easily processed because it is represented by a 3D matrix (one 2D matrix
for each color: red, green and blue) as shown in figure 1 [16-20].
- The color image has a huge size capable to hide short and long messages [31-36].
- The pixel values and the character’s values are decimal integers and have the same range from 0 to 255,
see figure 2 [21-30].
- The clearance of the image can be tested by the image itself and by the image histograms.
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 111
- It is easy to convert both the character values and the pixel values to binary to perform the required bits
replacement.
- It is easy to reshape the color image to one column or one row matrix.
- It is easy to get a required part (segment) from the image to use it as a covering segment.
Figure 1: Color image matrices and histograms [43-50]
Figure 2: Color pixels values [43-50]
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 112
Data steganography system contains as shown in figure 3: Covering image (CI), stego image (SI), secret message
(SM) and a private key (PK) to add a security issue to protect the message from being hacked [1-10].
Figure 3: Stego system components
LSB method uses the least significant bits (see figure 4) to be replaced by the message bits, this will add a minor
changes to the pixel value, these changes cannot be noticed and the stego image will be always closed to the
covering image (the changes are -1, 0 or +1 see figure 5) [1-10].
Figure 4: Used LSB bit
Figure 5: Minor changes when using LSB bit
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 113
LSB method has a hiding capacity equal the image size divided by 8, each character to be hidden requires 8 bytes
from the covering image, and the bytes must are consecutive, this method can be implemented applying the
following steps:
Hiding phase:
(See figure 6)
Step 1:
Get the covering image, retrieve the image size, and reshape the image to one column matrix.
Step 2:
Convert the image column matrix to binary.
Step 3:
Get the message, retrieve the message length (L), convert the message to decimal.
Step 4:
Convert the decimal matrix to binary.
Step 5:
Reserve 8 bytes from the binary image and use the LSBs to hide the character byte bits.
Step 6:
Convert the image matrix to decimal.
Step 7:
Reshape back the image matrix to get the stego image.
Figure 6: LSB method hiding
Extracting phase
(See figure 7)
Step 1:
Get the stego image, retrieve the image size and reshape the image matrix to one column matrix.
Step 2:
Convert the column matrix to binary.
Step 3:
From the binary matrix extract the LSBs of the 8 consecutive bytes to form the binary version of the character,
repeat this step L times.
Step 4:
Convert the character’s binary matrix to decimal, then to characters to get the secret message.
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 114
Figure 7: LSB method message extraction
The Proposed Method
The proposed method is based on LSB method by adding the following modifications:
1) Private key:
The proposed method uses a complicated private key (PK), which contains as shown in table 1 six values, each of
them has a double data type: Table 1: PK structure
Image segments fractions
S1
S2
S3
Message partitions fraction
P1
P2
P3
Example
0.197
0.265
0.298
0.321
0.178
0.275
The PK is used to divide the covering image into segments (4 segments) and to divide the message into partitions (4
partitions), each image segment will hold one message partition, the sizes of the segments are different and so the
partitions sizes. The covering image may be divided row wise or column wise, below is an example of dividing a
covering image and a secret message using the following PK (see figures 8 and 9):
Figure 8: Image "lena.jpg" segments
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 115
Figure 9: Message partitions
2) Patch hiding and extracting
The message binary version is to be reshaped into one column matrix and inserted in the LSBs of the image binary
version using one operation, also the extracted LSBs from the stego image (column matrix) is to be reshaped to 8
column matrix to form the binary version of the message, figure 10 and 11 show how to apply hiding and extracting
operations using patch method.
Patch method will minimize the number of operations required to apply message hiding and message extracting, this
will simplify these operations and will reduce the hiding and extracting times, thus the performance of message
steganography will be improved.
Figure 10: Hiding using patch method
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 116
Figure 11: Extracting using patching
The hiding phase of the proposed method can be implemented applying the following steps:
Step 1:
Data preparation: get the image, retrieve the image size, get the message, retrieve the message length, this step can
be implemented by executing the following mat lab instructions:
Step 2:
Get the private key (PK), this step can be implemented by executing the following mat lab instructions:
(Her position where to start hiding and extracting was added), this step can be implemented by executing the
following mat lab instructions:
Step3:
Image dividing into segments and message dividing into partitions: use the PK to calculate the size of each image
segment, and the length of each partition length, extract each segment and extract each partition, this step can be
implemented by executing the following mat lab instructions:
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 117
Step 4:
Hide each partition in the associated segment, use POS as a starting point of data hiding, this step can be
implemented as shown in figure 10, and it can be implemented by executing the following mat lab instructions:
Step 5:
Combine the stego segment in one image to get the stego image, this step can be implemented by executing the
following mat lab instructions:
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 118
The extracting process can be implemented applying the following steps:
Step 1:
Get the stego image and retrieve the image size, this step can be implemented by executing the following mat lab
instructions:
Step 2:
Get the PK, this step can be implemented by executing the following mat lab instructions:
(Her position where to start hiding and extracting was added), this step can be implemented by executing the
following mat lab instructions:
Step 3:
Image dividing into segments and message dividing into partitions: use the PK to calculate the size of each image
segment, and the length of each partition length, extract each segment and extract each partition, this step can be
implemented by executing the following mat lab instructions:
Step 4:
Message partitions extraction: for each message partition apply extraction as shown in figure 11; this step can be
implemented by executing the following mat lab instructions:
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 119
Step 5:
Combine the extracted partitions in one partition to get the secret message, this step can be implemented by
executing the following mat lab instructions:
Implementation and Results Discussion
The proposed method was implemented using various messages and various covering images, the images were taken
from the http:// sipi.usc.edu/database/ that is also known as the USC-SIPI Image Database to analyze the utility and
the do-ability of our proposed gray and RGB images cryptography scheme. All the related experiments and
simulations have been performed in MATLAB environment.
The proposed method was tested for sensitivity, the hiding function and the extraction function must use the same
PK, any changes in the PK during the extraction phase will be considered as a hacking attempt by extracting a
damages unreadable message. To prove the method sensitivity the message Securing secret message using
modified LSB method of data steganography was hidden in the image 'lena.jpg' using PK1, table 2 shows the
extracted messages using other PKs:
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 120
Table 2: Extracting using various PKs
Used
PK
Extracted message
PK1
Securing secret message using modified LSB method of data steganography
LSB
PK2
PK3
PK4
From table 2 we can see that using LSB method to extract the message will extract a damaged message, also any
minor changes in the PK (PK1) will produce a damaged previous message was hidden using various covering
images and using PK1, mean square error (MSE) [50-55], peak signal to noise ratio (PSNR), correlation coefficient
(CC) and number of pixels change ratio (NPCR) were calculated between the covering images and the stego images
[56-63], table 3 show the obtained results:
Table 3: Quality parameters between covering and stego images
Covering image
CCr, CCg, CCb
NPCR %
House.tiff
1, 1, 1
0.0342
2.2.01.tiff
1, 1, 1
0.0099
2.2.21.tiff
1, 1, 1
0.0086
4.2.07.tiff
1, 1, 1
0.0388
Lena,jpg
1, 1, 1
0.1510
Remarks
Excellent
Low
From table 3 we can see that the stego images are very closed to the covering ones, bedding the message keeps the
quality of the stego image high, this can be visually tested by locking to the images and their histogram as shown in
figures 12 and 13, the stego image is much closed to the covering image:
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 121
Figure 12: Covering image and histograms (example)
Figure 13: Stego image and histograms
The speed of the proposed method was tested, several messages were selected, the hiding time and the extracting
times were measured, the throughput (Bytes processed per second=message size divided by the time), table 4 shows
the speed parameters of processing various messages:
Table 4: Speed results
Covering image
Size (byte)
Hiding time
(second)
Extracting
time(second)
Hiding
throughput
(bytes per
second)
Extracting
throughput
(bytes per
second)
Message length= 2845 characters
House.tiff
786432
3.7480
0.0530
759.0715
53679
2.2.01.tiff
3145728
15.3010
0.0640
185.9356
44453
2.2.21.tiff
3145728
15.2510
0.0560
186.5451
50804
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 122
4.2.07.tiff
786432
3.7240
0.0500
763.9635
56900
Lena,jpg
172800
0.8250
0.0510
3448.5
55784
Message length= 8535 characters
House.tiff
786432
3.7920
0.1080
2250.8
79028
2.2.01.tiff
3145728
15.1180
0.1110
564.5588
76892
2.2.21.tiff
3145728
15.6590
0.1140
545.0540
74868
4.2.07.tiff
786432
3.7920
0.1080
2250.8
79028
Lena,jpg
172800
0.8230
0.1430
10371
59685
And as we can see from the table above, the time for message hiding increases with the increase in the size of the
carrier image, and accordingly, we recommend using carrier images of a small size to hide short secret messages, so
as to reduce the time required to process the image by dividing it into segments, for larger messages we can select
larger images to keep the throughput os steganography acceptable.
Conclusion
A secure method based on LSB method of secret messages cryptography was introduced. The method provided a
high level of security by using a complicated PK, this key contains 6 values, each of them had a double data type,
and thus the key space will be very large and capable to resist hacking attacks. The extracted message was very
sensitive to the selected PK, adding minor changes to the PK in the extraction phase was considered as a hacking
attempt by extracting a damaged unreadable message. The PK was used to divide the covering-stego images into
segments with variable lengths and to divided the secret message into partitions with different lengths, each message
partition was embedded into the associated segment. It was easy to change the PK and the covering image without
the needs to modify the method operations. The qualities of the stego images were tested and it was shown that the
stego image was always closed to the covering image and the obtained quality parameters values were always
excellent and acceptable. The proposed method gave a good performance and it was recommended to use covering
images with small sizes to increase the speed of message steganography.
References
[1]. Kaur, R. Dhir, & G. Sikka,“A new image steganography based on first component alteration technique”, International
Journal of Computer Science and Information Security (IJCSIS), 6, pp.53-56,
2009.http://arxiv.org/ftp/arxiv/papers/1001/1001.1972.pdf
[2]. Alvaro Martin, Guillermo Sapiro, &GadielSeroussi,“Is Steganography Natural”, IEEE Transactions on Image
Processing, 14(12), pp.2040-2050, 2005.doi: 10.1109/TIP.2005.859370
[3]. Bhattacharyya, A. Roy, P. Roy, & T. Kim,“Receiver compatible data hiding in color image”, International Journal of
Advanced Science and Technology, 6, pp.15-24, 2009.http://www.sersc.org/journals/IJAST/vol6/2.pdf
[4]. EE. KisikChang, J. Changho, & L. Sangjin,“High Quality Perceptual Steganographic Techniques”, Springer. 2939,
pp.518-531, 2004.doi: 10.1007/978-3-540-24624-4_42, http://www.springerlink.com/content/c6guuj5xnyy4wj3c/
[5]. C. Kessler,“Steganography: Hiding Data within Data” An edited version of this paper with the title "Hiding Data in
Data", Windows & .NET Magazine, 2001. [Online] Available: http://www.garykessler.net/library/steganography.html
(October 4,2011)
[6]. Gandharba Swain, &S.K.lenka,“Steganography-Using a Double Substitution Cipher”, International Journal of Wireless
Communications and Networking. 2(1), pp.35-39, 2010. ISSN: 0975-7163.
http://www.serialspublications.com/journals1.asp?jid=436&jtype
[7]. Hideki Noda, MichiharuNimi, &Eiji Kawaguchi,“High- performance JPEG steganography using Quantization index
modulation in DCT domain”, Pattern Recognition Letters, 27, pp.455-46,
2006.http://ds.lib.kyutech.ac.jp/dspace/bitstream/10228/450/1/repository6.pdf
[8]. Kathryn,“A Java Steganography Tool”, 2005.http://diit.sourceforge.net/files/Proposal.pdf
[9]. Motameni, M.Norouzi, M.Jahandar, & A. Hatami,“Labeling method in Steganography”, Proceedings of world academy
of science, engineering and technology, 24, pp.349-354, 2007. ISSN 1307-6884.
http://www.waset.org/journals/waset/v30/v30-66.pdf
[10]. Mohammed A.F Al Husainy, "Message Segmentation to Enhance the Security of LSB Image Steganography",
International Journal of Advanced Computer Science and Applications, 3(3): 57-62, 2012.http://www.ijacsa.thesai.org
[11]. Mohammed A.F Al Husainy, "Developed Segmented LSB Image Steganography", International Science and
Technology Conference (ISTEC 2012), Dubai, December 13-15, 2012. http://www.iste-c.net
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 123
[12]. Afjal H. Sarower; Rashed Karim; Maruf Hassan, An Image Steganography Algorithm using LSB Replacement through
XOR Substitution, Computer Science:2019 International Conference on Information and Communications Technology
(ICOIACT), DOI:10.1109/icoiact46704.2019.8938486.
[13]. Rashad J. Rasras1, Mutaz Rasmi Abu Sara2, Ziad A. AlQadi3, Rushdi Abu zneit, Comparative Analysis of LSB,
LSB2, PVD Methods of Data Steganography, International Journal of Advanced Trends in Computer Science and
Engineering, vol. 8, issue 3 ,2019, https://doi.org/10.30534/ijatcse/2019/64832019
[14]. Ziad A. Alqadi, Majed O. Al-Dwairi, Amjad A. Abu Jazar and Rushdi Abu Zneit, 2010, Optimized True-RGB color
Image Processing, World Applied Sciences Journal8 (10): 1175-1182, ISSN 1818-4952.
[15]. Waheeb, A. and Ziad AlQadi, 2009. Gray image reconstruction, Eur. J. Sci. Res., 27: 167-173.
[16]. Akram A. Moustafa and Ziad A. Alqadi, Color Image Reconstruction Using A New R'G'I Model, Journal of Computer
Science 5 (4): 250-254, 2009 ISSN 1549-3636.https://doi.org/10.3844/jcs.2009.250.254
[17]. Musbah J. Aqel, Ziad ALQadi, Ammar Ahmed Abdullah, RGB Color Image Encryption-Decryption Using Image
Segmentation and Matrix Multiplication, International Journal of Engineering & Technology, 7(3.13) (2018) 104-
107.https://doi.org/10.14419/ijet.v7i3.13.16334
[18]. Bilal Zahran, Ziad Alqadi, Jihad Nader, Ashraf Abu Ein,A COMPARISON BETWEEN PARALLEL
ANDSEGMENTATIONMETHODS USED FOR IMAGE ENCRYPTION-DECRYPTION International Journal of
Computer Science & Information Technology (IJCSIT) Vol 8, No 5,October 2016.
[19]. Khaled Matrouk, Abdullah Al- Hasanat, HaithamAlasha'ary, Ziad Al-Qadi, Hasan Al-Shalabi, Analysis of Matrix
Multiplication Computational Methods, European Journal of Scientific Research, ISSN 1450-216X / 1450-202X
Vol.121 No.3, 2014, pp.258-266.
[20]. Ziad A.A. Alqadi, Musbah Aqel, and Ibrahiem M. M. ElEmary, Performance Analysis and Evaluation ofParallel
Matrix Multiplication Algorithms, World Applied Sciences Journal 5 (2): 211-214, 2008.
[21]. Z Alqadi, A Abu-Jazzar, Analysis of program methods used in optimizing matrix multiplication, Journal of
Engineering, 2005.
[22]. Musbah J. Aqel , Ziad A. Alqadi, Ibraheim M. El Emary, Analysis of Stream Cipher Security Algorithm, Journal of
Information and Computing Science Vol. 2,No. 4, 2007, pp. 288-298.
[23]. J. Al-Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, M. Abu-Zaher, A Novel zero-error method to create a secret tag for an
image, Journal of Theoretical and Applied Information Technology, Vol. 96. No. 13, pp. 4081-4091, 2018.
[24]. Prof. Ziad A.A. Alqadi, Prof. Mohammed K. Abu Zalata, Ghazi M. Qaryouti, Comparative Analysis of Color Image
Steganography, JCSMC, Vol.5, Issue. 11, November 2016, pg.3743.
[25]. M. Jose, Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality”, International
Journal of Science and Research, Vol. 3, No. 9, pp. 2281-2284, 2014.
[26]. Emam, M. M., Aly, A. A., & Omara, F. A. An Improved Image Steganography Method Based on LSB Technique with
Random Pixel Selection. International Journal of Advanced Computer Science &Applications,1(7), pp. 361-366,
(2016). https://doi.org/10.14569/IJACSA.2016.070350
[27]. Mohammed Abuzalata; Ziad Alqadi; Jamil Al-Azzeh; Qazem Jaber, Modified Inverse LSB Method for Highly Secure
Message Hiding, IJCSMC, Vol. 8, Issue.2, February 2019, pg.93 103
[28]. Rashad J. Rasras, Mutaz Rasmi Abu Sara, Ziad A. AlQadi, Engineering, A Methodology Based on Steganography and
Cryptography to Protect Highly Secure Messages Engineering Technology & Applied Science Research, Vol.9 Issue 1,
Pages 3681-3684, 2019.
[29]. Zhou X, Gong W, Fu W, Jin L. 2016An improved method for LSB based color image steganography combined with
cryptography. In 2016 IEEE/ACIS 15thInt. Conf. on Computer and Information Science (ICIS), Okayama, Japan, pp.
14 .https://doi.org/10.1109/ICIS.2016.7550955
[30]. Wu D-C, Tsai W-H. A stenographic method for images by pixel value differencing. Pattern Recognition. Lett. 24,
16131626. 2003https://doi.org/10.1016/S0167-8655(02)00402-6
[31]. Das R, Das I. Secure data transfer in IoT environment: adopting both cryptography and steganography techniques. In
Proc. 2nd Int. Conf. on Research in Computational Intelligence and Communication Networks, Kolkata, India, pp.
296301, 2016.https://doi.org/10.1109/ICRCICN.2016.7813674
[32]. M. Abu-Faraj, and Z. Alqadi, “Image Encryption using Variable Length Blocks and Variable Length Private Key,”
International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 11, Iss. 3, pp. 138-151, 2022.
[33]. M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, “A Dual Approach for Audio Cryptography,” Journal of Southwest Jiaotong
University, vol. 57, no. 1, pp. 24-33, 2022.
[34]. M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, “Complex Matrix Private Key to Enhance the Security Level of Image
Cryptography,” Symmetry, vol. 14, Iss. 4, pp. 664-678, 2022.
[35]. M. Abu-Faraj, K. Aldebei, and Z. Alqadi, “Simple, Efficient, Highly Secure, and Multiple Pur- posed Method on Data
Cryptography,” Traitement du Signal, vol. 39, no. 1, pp. 173-178, 2022.
[36]. M. Abu-Faraj, Khaled Aldebe, and Z. Alqadi, “Deep Machine Learning to Enhance ANN Performance: Fingerprint
Classifier Case Study,” Journal of Southwest Jiaotong University, vol. 56, no. 6 , pp. 685-694, 2021.
[37]. M. Abu-Faraj, Z. Alqadi, and K. Aldebei, “Comparative Analysis of Fingerprint Features Ex- Traction Methods,”
Journal of Hunan University Natural Sciences, vol. 48, iss. 12, pp. 177-182, 2021.
Prof. Ziad Alqadi et al, International Journal of Computer Science and Mobile Computing, Vol.12 Issue.4, April- 2023, pg. 110-124
© 2023, IJCSMC All Rights Reserved 124
[38]. M. Abu-Faraj, and Z. Alqadi, “Improving the Efficiency and Scalability of Standard Meth- ods for Data
Cryptography,” International Journal of Computer Science and Network Security (IJCSNS), vol. 21, no.12 , pp. 451-
458, 2021.
[39]. Abdullah N. Olimat, Ali F. Al-Shawabkeh, Ziad A. Al-Qadi, Nijad A. Al-Najdawi, Forecasting the influence of the
guided flame on the combustibility of timber species using artificial intelligence, Case Studies in Thermal Engineering,
Volume 38, 2022, 102379, ISSN 2214-157X, https://doi.org/10.1016/j.csite.2022.102379.
[40]. M. Abu-Faraj, and Z. Alqadi, “Image Encryption using Variable Length Blocks and Variable Length Private Key,”
International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 11, Iss. 3, pp. 138-151, 2022.
[41]. M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, “A Dual Approach for Audio Cryptography,” Journal of Southwest Jiaotong
University, vol. 57, no. 1, pp. 24-33, 2022.
[42]. M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, “Complex Matrix Private Key to Enhance the Security Level of Image
Cryptography,” Symmetry, vol. 14, Iss. 4, pp. 664-678, 2022.
[43]. M. Abu-Faraj, K. Aldebei, and Z. Alqadi, “Simple, Efficient, Highly Secure, and Multiple Purr - posed Method on Data
Cryptography,” Traitement du Signal, vol. 39, no. 1, pp. 173-178, 2022.
[44]. M. Abu-Faraj, Khaled Aldebe, and Z. Alqadi, “Deep Machine Learning to Enhance ANN Performance: Fingerprint
Classifier Case Study,” Journal of Southwest Jiaotong University, vol. 56, no. 6 , pp. 685-694, 2021.
[45]. M. Abu-Faraj, and Z. Alqadi, “Improving the Efficiency and Scalability of Standard Meth- odds for Data
Cryptography,” International Journal of Computer Science and Network Security (IJCSNS), vol. 21, no.12 , pp. 451-
458, 2021.
[46]. J. Vilkamo and T. Bäckström, “Time-Frequency Processing: Methods and Tools,” in Parametric Time-Frequency
Domain Spatial Audio, V. Pulkki, S. Delikaris-Manias, and A. Politis, Eds. Wiley, 2017, pp. 324.
[47]. K Matrouk, A Al-Hasanat, H Alasha'ary, Ziad Al-Qadi, H Al-Shalabi, Speech fingerprint to identify isolated word
person, World Applied Sciences Journal, 31 (10), 1767-1771, 2014.
[48]. Ziad alqadi, Analysis of stream cipher security algorithm, Journal of Information and Computing Science, vol. 2, issue
4, pp. 288-298, 2007.
[49]. Jamil Al-Azzeh, Bilal Zahran, Ziad Alqadi, Belal Ayyoub, Muhammed Mesleh, A Novel Based On Image Blocking
Method to Encrypt-Decrypt Color, International Journal on Informatics Visualization, vol. 3, issue 1, pp. 86-93, 2019.
[50]. Musbah J Aqel, Ziad ALQadi, Ammar Ahmed Abdullah, RGB Color Image Encryption-Decryption Using Image
Segmentation and Matrix Multiplication, International Journal of Engineering and Technology, vol. 7. Issue 3.13, pp.
104-107. 2018.
[51]. Jihad Nadir, Ashraf Abu Ein, Ziad Alqadi, A Technique to Encrypt-decrypt Stereo Wave File, International Journal of
Computer and Information Technology, vol. 5, issue 5, pp. 465-470, 2016.
[52]. Saleh Khawatreh, Belal Ayyoub, Ashraf Abu-Ein, Ziad Alqadi, A Novel Methodology to Extract Voice Signal
Features, International Journal of Computer Applications, vol. 975, pp. 8887, 2018.
[53]. Majed O. Al-Dwairi, Amjad Y. Hendi, Mohamed S. Soliman, Ziad A.A. Alqadi, A new method for voice signal
features creation, International Journal of Electrical and Computer Engineering (IJECE), vol. 9. Issue 9, pp. 4092-4098,
2019.
[54]. Aws Al-Qaisi, Saleh A Khawatreh, Ahmad A Sharadqah, Ziad A Alqadi, Wave File Features Extraction Using
Reduced LBP, International Journal of Electrical and Computer Engineering, vol. 8. Issue 5, pp. 2780-2787, 2018.
[55]. Ayman Al-Rawashdeh, Ziad Al-Qadi, using wave equation to extract digital signal features, Engineering, Technology
& Applied Science Research, vol. 8, issue 4, pp. 1356-1359, 2018.
[56]. Ashraf Abu-Ein, Ziad AA Alqadi, Jihad Nader, A TECHNIQUE OF HIDING SECRETE TEXT IN WAVE FILE,
International Journal of Computer Applications, 2016.
[57]. Ismail Shayeb, Ziad Alqadi, Jihad Nader, Analysis of digital voice features extraction methods, International Journal of
Educational Research and Development, vol. 1, issue 4, pp. 49-55, 2019.
[58]. Jihad Nader Ahmad Sharadqh, Ziad Al-Qadi, Bilal Zahran, Experimental Investigation of Wave File Compression-
Decompression, International Journal of Computer Science and Information Security, vol. 14m issue 10, pp. 774-780,
2016.
[59]. Ziad A AlQadi Amjad Y Hindi, O Dwairi Majed, PROCEDURES FOR SPEECH RECOGNITION USING LPC AND
ANN, International Journal of Engineering Technology Research & Management, vol. 4, issue 2, pp. 48-55, 2020.
[60]. Majed O Al-Dwairi, A Hendi, Z AlQadi, an efficient and highly secure technique to encrypt-decrypt color images,
Engineering, Technology &Applied Science Research, vol. 9, issue 3, pp. 4165-4168, 2019.
[61]. Amjad Y Hendi, Majed O Dwairi, Ziad A Al-Qadi, Mohamed S Soliman, a novel simple and highly secure method for
data encryption-decryption, International Journal of Communication Networks and Information Security, vol. 11, issue
1, pp, 232-238, 2019
[62]. Prof. Ziad Alqadi, Dr. Mohammad S. Khrisat, Dr. Amjad Hindi, Dr. Majed Omar Dwairi, USING SPEECH SIGNAL
HISTOGRAM TOCREATE SIGNAL FEATURES, International Journal of Engineering Technology Research &
Management, vol. 4, issue 3, pp. 144-153, 2020.
[63]. M. Abu-Faraj, Z. Alqadi, and K. Aldebei, “Comparative Analysis of Fingerprint Features Ex- Traction Methods,”
Journal of Hunan University Natural Sciences, vol. 48, iss. 12, pp. 177-182, 2021.
Article
Full-text available
Color digital images are one of the most widespread and widely used types of data, and the image can be secret or of a special nature, or it can be a carrier of confidential data, which makes protecting it very important. In this research, a new method for protecting color digital images will be presented, and the ease of implementing this method and its suitability for any digital image will be shown. The proposed method will provide a high degree of security and provide a high degree of protection for the digital image through the use of a complex private key based on chaotic logistic map model, six chaotic key will be used to form six integer keys, and these keys will be resized to match the dimensions of each color channel. The proposed method will use two rounds of data cryptography; each round will require three private keys, one for each color. Different variations of CLMM will be used to generate 1D and 2D chaotic keys, the results of using 1D chaotic keys will be compared with the results of using 2D chaotic keys and some recommendations will be raised. The proposed method will be implemented, different types of results analysis's (Quality analysis, sensitivity analysis, and throughput analysis) to improve the enhancement provided by yje proposed method comparing with other existing methods.
Article
Full-text available
This paper anticipates the burning rate and optical obscuration characteristics of a 10 mm thick timber species often used in buildings under the influence of a guided flame condition with heat fluxes of 25 kW/m² and 50 kW/m². The smoke density chamber was used to test the wood species Pinus strobus, Pinus kesiya, Quercus alba, and Faqus sylvatica. The experimental data: time, specific gravity, mass loss, and heat flow were used as input variables to an artificial neural network (ANN) model. ANN with structure of 4-64-32-2 was built and validated, the results revealed that, the correctness of the established simulation was proven by a high value of R² (0.99292 for validation) and highest validation performance (MSE = 17.809 at epoch 12). When the heat flow was reduced from 50 kW/m² to 25 kW/m², Quercus had the greatest drop in mass optical density (MOD). In the case of 25 kW/m², the average charring rate was roughly 0.57 mm/min, compared to 0.96 mm/min in the case of 50 kW/m². The MOD declines asymptotically for all species regardless of heat flux. The findings give statistical support and theoretical reference for fire-related construction norms and standards.
Article
Full-text available
Some digital data circulated through various social media, regardless of its nature, requires high-level protection and security for various reasons. In this research, a multi-purpose method will be presented to be used in encrypting SMS messages, text files regardless of their size, digital images of all kinds and sizes, and audio files of all kinds and sizes. The proposed method will be examined to prove its efficiency, and the practical results will be compared with the implementation results of other internationally approved methods to show the extent to which the method improves efficiency indicators. It will be shown how to use digital color image to generate a highly secure private key which will make the process of hacking impossible. The Quality of the encrypted and decrypted images will be examined to justify the use of the proposed method.
Article
Full-text available
Providing a secure and effective way to protect confidential and private data is an urgent process, and accordingly, we will present in this research paper a new method, which is called multiple rounds variable block method (MRVB) which depends on the use of a colored image that is kept secret to generate needed work and round keys. This method can be used to encrypt-decrypt data using various lengths private key and data blocks with various sizes. The number of rounds also will be variable starting from one round. MRVB will be implemented and compared with the encryption-decryption standards DES and AES to show the improvements provided by the proposed method in increasing the security level and in increasing the throughput of the process of data cryptography. The generated private key contents will depend on the used image_key and on the selected number of rounds and the selected number of bytes in each block of data.
Article
Full-text available
K means method and LBP based methods are commonly used for manipulating digital wave files, and they can be used for wave file features extraction, these features can be used later on as a wave file key or signature which refers to the wave file in any application, such as voice recognition or voice retrieval applications. K means method can be used to extract voice features, these features can be represented by clusters points, or within_cluster sums, or by the clusters centroids, and in this paper we will investigate the both methods in order to do some recommendations regarding the efficient method of voice features extraction.
Article
Full-text available
Digital audio is one of the most important types of data at present. It is used in several applications, such as human knowledge and many security and banking applications. A digital voice signal is usually of a large size where the acoustic signal consists of a set of values distributed in one column (one channel) (mono signal) or distributed in two columns (two channels) (stereo signal), these values usually are the results of sampling and quantization of the original analogue voice signal. In this paper we will introduce a method which can be used to create a signature or key, which can be used later to identify or recognize the wave file. The proposed method will be implemented and tested to show the accuracy and flexibility of this method.
Article
Full-text available
Digital color images are considered as the most widely used data. They are exchanged frequently on the internet and via email, so an efficient and highly secure method of color image encryption and decryption is needed. Different methods of encryption-decryption are used, but most of them suffer from low efficiency or low-security level or both. In this paper, an efficient and highly secure method of encryption-decryption will be proposed, tested, and implemented. The efficiency parameters will be calculated and compared with other methods' parameters to prove the efficiency of the proposed method.
Article
Full-text available
p>In this work, we present a novel approach for extracting features of a digital wave file. This approach will be presented, implemented and tested. A signature or a key to any wave file will be created. This signature will be reduced to minimize the efforts of digital signal processing applications. Hence, the features array can be used as key to recover a wave file from a database consisting of several wave files using reduced Local binary patterns (RLBP). Experimental results are presented and show that The proposed RLBP method is at least 3 times faster than CSLBP method, which mean that the proposed method is more efficient.</p
Article
Full-text available
Encryption of digital color image is the process of conversion original digital color image into an encrypted one to protect the image from hacking or to prevent an authorized person to get the valuable information located in the color image. The process of color image encryption-decryption is very important issue in human activities and here in this paper we will introduce a new simple, efficient and highly secure method to be used for color image encryption-decryption. The proposed method will be tested and implemented, the efficiency parameters of the proposed method will be calculated and will be compared with other methods parameters to prove the efficiency issues of the proposed method.
Article
Full-text available
Nowadays, privacy is a demand for every one specially when sending personal information over the internet using social media sites and applications. One way to ensure this privacy is by hiding our personal or secret information inside an image (cover image). Only how knows the hiding process can extract the information from the cover image. To ensure that the cover image must preserve its quality as possible so that no one doubt about it. The process of hiding a text in gray and color image (creating a tag) is used in many important applications. Generally, most methods have been proposed to solve the issue depend on least significant bit (LSB) criteria. LSB methods have a set of negatives and defects in addition to lack of safety of these methods, error ratio between the original image and the text-bearing image ranges from small to large; If the error rate is high, this will lead to distortion in the image which can be observed by the naked eye of the human. Accordingly, to reduce error rate the text message size must be small; the size of the hidden text in the image depends on the size of the image. In this paper, we introduced a novel approach to hide any text independently on the size of cover-image and make the size of the text unrestricted “as it can be larger than the cover-image size”. Our approach provided a high degree of safety with zero error ratio regardless of the size of the text.