paper_217834
paper_217834
1 Introduction
34 http://www.i-jim.org
Paper— Combination of Hiding and Encryption for Data Security
and signals [3-5]. The data is encrypted using two scenarios. The first was to use a
wavelet transformer to change the shape of the signal or image to a different form of
the original[6, 7]. In the second stage, the exponential function was used to complete
the encoding process to the final form. While the hiding algorithm was built between
the two encryption phases. (Stego-crypto) as a term, goes to attain its importance
attributable to the exponential growth and secret communication of potential users over
the web [8, 9]. In addition, it has become an important tool for data security especially
in military applications for example 5 G is more security others wireless
communication techniques [10, 11]. The proposed work includes: decompose both
encrypting data and hiding data, generate the modulated medium, data embedding, data
extraction, and data recovery.
Wavelet conversion is known to convert other data types from time domain to
frequency domain. It is used to analyze a signal that does not produce information about
"frequency" in the traditional sense, but a time and size distribution is created. The
change in the size of the wavelet is represented by a two factor. It is therefore possible
to reconstruct any signal using one wave as a base and to place as many waves as needed
at different times with different amplitudes and scales [12-14].The equations for
conversion can be summarized as follows:
𝑦𝑙𝑜𝑤 [𝑛] = ∑+∞
𝑘=−∞ 𝑥[𝑘]𝑔[2𝑛 − 𝑘] (1)
𝑦ℎ𝑖𝑔ℎ [𝑛] = ∑+∞
𝑘=−∞ 𝑥[𝑘]ℎ[2𝑛 + 1 − 𝑘]
(2)
Where:
x is chosen data.
g is high pass filter.
h is low pass filter.
This decomposition reduced the time resolution by half as half of each output filter
distinguishes the signal. However, each output has half the frequency band of the input,
thus multiplying the frequency resolution [15, 16].
2 Literature Review
In [17], they presented a biometric authentication scheme that uses two separate
biometric features combined by watermark embedding with hidden password
encryption to obtain a non-unique identifier of the personage. They provided
experimental results. The transformed features and templates trek through insecure
communication line like the Internet or intranet in the client-server environment. The
authors in [18], proposed technique is a composition of both encryption and data hiding
using some properties of Deoxyribonucleic Acid (DNA) sequences. The proposed
scheme consists mainly of two phases. In the first phase, the secret data is encrypted
using a DNA and Amino Acids-Based Play fair cipher. While in the second phase the
encrypted data is steganography ally hidden into some reference DNA sequence using
an insertion technique. In [19]proposed an LSB & DCT-based steganography method
for hiding the data. Each bit of data is embedded by altering the least significant bit of
low frequency DCT coefficients of cover image blocks. They used some techniques to
utilizes the idea of SSB-4 technique in modifying the other bits to obtain the minimum
variation between the original and the modified coefficient. The author in [20] explored
the limits of Steganography theory and practice. He printed out the enhancement of the
image Steganography system using LSB approach to provide a means of secure
communication. A stego-key has been applied to the system during embedment of the
message into the cover image. The recent explosion of research in watermarking to
protect intellectual property is evidence that Steganography is not just limited to
military or espionage applications.In [21]designed sequence the combined scrambling
operation is utilized for changing the pixel position of secret image under the control of
a random matrix. At the same time, the pixel value is altered by random bit shift for
obtaining an encrypted image encoded in N-bit data. These operations are employed
for all pixels of original secret image. The authors in [22], they proposed a method,
which combines the techniques of Steganography and cryptography, to hide the secret
data in an image. In the first phase, the sender will embed the secret data in an image
by using the Least Significant Bit (LSB) technique. The embedded image will be
encrypted by using an encryption algorithm. In [23], they Advanced Encryption
Standard (AES) algorithm has been modified and used to encrypt the secret message.
the encrypted message has been hidden by Enhancing Pixel Value Difference (PVD)
image using Mobile Phone Keypad (MPK) Coding. In [24], they introduced PASH, a
privacy-aware s-health access control system, which the key ingredient is a large
universe CP-ABE with access policies partially hidden. In PASH, attribute values of
access policies are hidden in encrypted SHRs and only attribute names are revealed.
In order to assess the quality of the method of hiding and encrypting information,
commonly used measures are, arithmetic mean (average), and entropy. Mean is used to
quantify the difference between the initial (cover signal) or (modulated signal) and the
Mixed encrypted hidden signal, distorted signal, equation (3) [25-26]. Entropy is the
average rate at which information is produced by a stochastic source of data. The
measure of information entropy associated with each possible data value is the negative
logarithm of the probability mass function for the value equation (4) [27-29].
1 𝑎1 +𝑎2 +⋯+𝑎𝑛
𝐴 = ∑𝑛𝑖=1 𝑎𝑖 = (3)
𝑛 𝑛
Where:
ai = elements.
n = number of elements.
36 http://www.i-jim.org
Paper— Combination of Hiding and Encryption for Data Security
∑𝑁 𝑀 ̅ ̅
𝑖=1 ∑𝐽=1(𝐼1 (𝑖,𝑗)−𝐼1 )(𝐼2 (𝑖,𝑗)−𝐼2 )
𝐶𝑜𝑟𝑟 = (4)
√[∑𝑁 𝑀 ̅ 2 𝑁 𝑀 ̅ 2
𝑖=1 ∑𝐽=1(𝐼1 (𝑖,𝑗)−𝐼1 ) ][∑𝑖=1 ∑𝐽=1(𝐼2 (𝑖,𝑗)−𝐼2 ) ]
Where:
I1(i,j) = the value of pixel at (i,j) of the original image.
𝐼1̅ = the mean of the original image.
1
𝐼1̅ = ∑𝑁 𝑀
𝑖=1 ∑𝑗=1 𝐼1 (𝑖, 𝑗) (4.1)
𝑀×𝑁
M = height of image.
N = width of image.
(i,j) = row and column numbers.
𝑆 = − ∑𝑖 𝑃𝑖 log 𝑃𝑖 (5)
Where: Pi = probability.
In this section of this research, the algorithms designed to build the proposed work
will be presented with the results obtained. Calculations were performed and all
algorithm were implemented using MATLAB. Each cryptographic algorithm will be
presented for each case discussed with decipher algorithm as well as the results for both
cases, as follows:
Table 1. ALGORITHM (1-a): encryption of one-dimension signal for two cases, low
frequency signal (LFS) sine wave and high frequency (HFS) of EEG signal.
ALGORITHM (1-a): Encryption Algorithm
Read the first data signal with high frequency, modulated signal, signal=m sample.
Read second data signal with low frequency signal (LFS) or high frequency signal (HFS) to be
encrypted and hidden, EEG or sin=n sample.
Decompose the first signal (modulated signal) using wavelet packet transform law (wpt):
wpt=wpdec(signal, 3, 'db1').
Find the best tree of (wpt) using the rule: bt=besttree(wpt).
Find the coefficients of (besttree).
Link these coefficients together to get the modulated signal (the mother signal=m samples).
Zeroing the positive values of the mother signal after saving them and their locations, c11, loc1.
Decompose second signal (signal to hide) using the second wavelet transform law: [C,
L]=wavedec(sin, 3, 'db1'), C=n samples.
Images from (A1 to E) of Figure (1) and from (A1 to E) of Figurer (2), depict in
details the experimental results of ALGORITHM (1-a) using (LFS) sine wave and
(HFS) EEG signal respectively, as follow:
38 http://www.i-jim.org
Paper— Combination of Hiding and Encryption for Data Security
Images from (A to E2) of Figure (3) and from (A to E2) of Figurer (4), depict in
details the experimental results of ALGORITHM (1-b) using (LFS) sine wave and
(HFS) EEG signal respectively, as follow:
40 http://www.i-jim.org
Paper— Combination of Hiding and Encryption for Data Security
Zeroing the negative values of image to hide, (signal to hide=c2) after saving them and their
5.
locations, c12, loc2.
Make modulation process, as follow:
for i=1:m: [no. of modulated signals' samples=c1].
if c1(i)==0: [(c1) is the modulated signal].
loc(k)=i:[save the locations].
6.
count=count+1
c1(i)=c2(k): [put the values of (c2 signal) in zeros locations of modulated signal (c1) or mother
signal].
end; end
7. Prepare (exponential function) file of the same dimension of mother signal, e=m sample.
8. Make math. Equation between (e and c1).
9. Getting encrypted and hidden signals (images) end
Images from (A1 to F) of Figure (5) shows in details the experimental results of
ALGORITHM (2-a)
42 http://www.i-jim.org
Paper— Combination of Hiding and Encryption for Data Security
Images from (A to E2) of Figure (6) shows in details the experimental results of
ALGORITHM (2-b)
Table (1) illustrates the quality measurements used for the purpose of showing the
efficiency of the method and comparing cases before and after the hiding and
encryption operations. The measurements entropy and average were used, as follows:
5 Conclusion
44 http://www.i-jim.org
Paper— Combination of Hiding and Encryption for Data Security
encryption because of embedding signals' process. And the entropy of encrypted signal
is less than of the two signals before encryption, which means the characteristics which
distinguished each signal are completely lost after they are combined into a single
signal. Using of the exponential function as an intermediary in the encryption process
has proven successful by obtaining completely different results from the original. The
whole encryption process gave us forms of information has no similarity to the original.
After removing the cover and decrypting, the resulting image or signal is exactly
identical to the original.
6 References
[1] O. Abikoye, K. Adewole, and A. Oladipupo, "Efficient data hiding system using
cryptography and steganography," 2012.
[2] P. P. Aung, T. M. J. I. J. o. I. T. Naing, Modeling, and Computing, "A novel secure
combination technique of steganography and cryptography," vol. 2, no. 1, pp. 55-62, 2014.
https://doi.org/10.5121/ijitmc.2014.2105
[3] N. Rashmi and K. Jyothi, "An improved method for reversible data hiding steganography
combined with cryptography," in 2018 2nd International Conference on Inventive Systems
and Control (ICISC), 2018, pp. 81-84: IEEE. https://doi.org/10.1109/icisc.2018.839
8946
[4] C. Anuradha, S. J. I. J. o. A. R. i. C. S. Lavanya, and S. Engineering, "Secure and
authenticated reversible data hiding in encrypted image," vol. 3, no. 4, 2013.
[5] H. Alrikabi, A. H. Alaidi, and K. J. I. J. o. I. M. T. Nasser, "The Application of Wireless
Communication in IOT for Saving Electrical Energy," vol. 14, no. 01, pp. 152-160, 2020.
https://doi.org/10.3991/ijim.v14i01.11538
[6] G. Bhatnagar, Q. J. Wu, and B. J. I. S. Raman, "Discrete fractional wavelet transform and
its application to multiple encryption," vol. 223, pp. 297-316, 2013. https://doi.org/10.
1016/j.ins.2012.09.053
[7] H. T. S. J. W. J. o. E. S. ALRikabi, "Study the Matching of the Level of Electromagnetic
Radiation Emitted by Communication Towers in the Kut City with the International Health
organization criterion," vol. 4, no. 1, pp. 101-111, 2016.
[8] F. Petitcolas, R. Anderson, and M. J. S. i. o. p. o. m. c. Kuhn, "Information Hiding-A
Survey'Proceedings of the IEEE," vol. 87, no. 7, pp. 1062-1078, 1999. https://doi.org/10.
1109/5.771065
[9] H. Rout, B. K. J. I. J. o. E. Mishra, and C. Engineering, "Pros and cons of cryptography,
steganography and perturbation techniques," pp. 76-81, 2014.
[10] C. P. Chen and C.-Y. J. I. s. Zhang, "Data-intensive applications, challenges, techniques and
technologies: A survey on Big Data," vol. 275, pp. 314-347, 2014. https://doi.org/10.1016/
j.ins.2014.01.015
[11] H. T. Alrikabi, A. H. M. Alaidi, A. S. Abdalrada, and F. T. J. I. J. o. E. T. i. L. Abed,
"Analysis the Efficient Energy Prediction for 5G Wireless Communication Technologies,"
vol. 14, no. 08, pp. 23-37, 2019. https://doi.org/10.3991/ijet.v14i08.10485
[12] R. J. E. o. I. S. Rao and Technology, "Wavelet transforms," 2002.
[13] A. Grinsted, J. C. Moore, and S. J. N. p. i. g. Jevrejeva, "Application of the cross wavelet
transform and wavelet coherence to geophysical time series," vol. 11, no. 5/6, pp. 561-566,
2004. https://doi.org/10.5194/npg-11-561-2004
46 http://www.i-jim.org
Paper— Combination of Hiding and Encryption for Data Security
7 Authors
Article submitted 2020-03-06. Resubmitted 2020-04-21. Final acceptance 2020-04-21. Final version
published as submitted by the authors.