Message Encryption by Processing Image Using Pseudo Random Key Streams Generation

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-20 Number-2
Year of Publication : 2015
Authors : Hamad Naeem , Jun Sang , Waqar Ali Abro , Adeel Khalid , Muhammad Rashid Naeem , Adeel Akbar Memon , Saad Tanvir


Hamad Naeem , Jun Sang , Waqar Ali Abro , Adeel Khalid , Muhammad Rashid Naeem , Adeel Akbar Memon , Saad Tanvir "Message Encryption by Processing Image Using Pseudo Random Key Streams Generation". International Journal of Computer Trends and Technology (IJCTT) V20(2):78-82, Feb 2015. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
with the passage of time as technology is evolving, there is an increase in number of massive security attacks estimated. In this fast growing communication network, data security has become a major issue. Cryptography is usually employed to solve this problem. However combination of cryptography with steganography is very valuable. In this paper, we introduce a technique of hiding message by first encrypting it with pseudorandom key stream of bits and then embed this encrypted data inside image using Bit shifting method. The primary purpose of this paper is to enhance security of useful data possibly by combining steganography with cryptography.

[1] A. A. Memon, M. R. Naeem, M. Tahir, M. Aamir, A. A. Wagan, "A New Cloud Computing Solution for Government Hospitals to Better Access Patients’ Medical Information", American Journal of System and Software, vol. 2 (3), pp. 56-59, June 2014.
[2] J. D. Arcy, A. Hovav, D. Galletta, “User awareness of security counter measures and its impact on information systems misuse: A Deterrence Approach”, Information Systems Research, vol. 20 (1), pp. 77-98, March. 2009.
[3] F. B. Shaikh, S. Haider,” Security threats in cloud Computing”, in 6th International Conference on Internet Technology and Secured Transactions, p. 214-219, December. 2011.
[4] H. Matbouli, Q. Gao, “An Overview on Web Security Threats and Impact to E-Commerce Success”, in 2012 International Conference on Information Technology and e-Services, pp. 1- 6, March. 2012.
[5] M. Jouini, L. B. A. Rabai, A. B. Aissa,” Classification of security threats in information systems”, 5th international conference on Ambient Systems, pp. 489-496, December.2014.
[6] H. Sharma, M. Arya, D. Goyal, "Secure Image Hiding algorithm using cryptography and steganography”, International Journal of Scientific Research, vol. 13 (5), pp. 01-06, Jul-Aug. 2013.
[7] A. Almohammad, G. Ghinea, R. M. Hierons, "JPEG Steganography: A Performance Evaluation of Quantization Tables", in Advanced Information Networking and Applications, 2009. AINA 09. International Conference, pp. 471-478, May. 2009.
[8] Ayushi, “A Symmetric Key Cryptographic Algorithm”,in International Journal of Computer Applications, pp. 01-04, February. 2010.
[9] R. M. Patel, D. J. Shah,” Multiple LSB data hiding based on Pixel value And MSB value”, in 2013 Nirma University International Conference ,pp. 1-5, November. 2013.
[10] M. Mishra, G. Tiwari, A. K. Yadiv,”Secret Communication Using Public Key Steganography”, in IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), pp. 1-5, May. 2014.
[11] S. Narayana, G. Prasad,”Two New Approaches For Secured Image Steganography Using Cryptographic Techniques And Type Conversions”, Signal & Image Processing: An International Journal (SIPIJ), pp. 60-73, December. 2010.
[12] W. Stallings, Cryptography and Network Security, (Five Editions), ISBN: 978-81-317-6166-3, 2011.
[13] M. R. Naeem, W. Zhu, A. A. Memon,” New approach for UML Based modeling of relational databases”, International Journal of Computer Science and Telecommunications, Vol. 5(5), pp. 18-23, May. 2014.

Data Encryption, Image Processing, Pseudorandom Key Streams, Steganography