An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography

Cryptography and steganography are the most common methods for ciphering and hiding data, respectively. Cryptography is a technique uses mathematics to encrypt and decrypt data, where the data is converted into some other gibberish form, and then the encrypted data is transmitted. However, crypto...

Full description

Saved in:
Bibliographic Details
Main Author: Anes Abdulgahar Shaker
Format: Thesis
Language:English
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-usim-ddms-12445
record_format uketd_dc
spelling my-usim-ddms-124452024-05-29T04:11:20Z An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography Anes Abdulgahar Shaker Cryptography and steganography are the most common methods for ciphering and hiding data, respectively. Cryptography is a technique uses mathematics to encrypt and decrypt data, where the data is converted into some other gibberish form, and then the encrypted data is transmitted. However, cryptography alone cannot guarantee that the data will be entirely secured because the scrambled message is still visible to the eavesdropper. On the other hand, steganography is the art and science of hiding conununication. Therefore, a stenographic system embeds hidden content in the unremarkable cover media such as text to avoid an eavesdropper's suspicion. Existing methods are still lacking in capacity and security. Hence, an enhanced hybrid method using existing Advanced Encryption Standard (AES) algorithm and new Arabic text steganography based on concept of lunar and solar letters is proposed. AES algorithm is chosen because symmetric encryption algorithm runs faster and performs better in smaller scale applications as compared to Asymmetric key algorithms. In addition, the memory requirement of Symmetric algorithm is lesser as compared to asymmetric. Five variations of text steganography methods namely Method A, Method B, Method C, Method D and Method E that consist of 28 Arabic letters classified into 14 solar letters and 14 lunar letters are proposed. Evaluation on capacity and security against three related existing methods were carried out. Capacity is evaluated using embedding ratio and efficiency ratio while security is evaluated using invisibility test. Invisibility test is carried out using a survey on random 100 Iraqi computer science students. Method A produces the highest embedding ratio 84.26% and the highest efficiency ratio 70.13%. In addition, method A produces the highest security with results of 100% from the invisibility survey when compared with four proposed and three existing methods. It is concluded that method A outweighs other methods in terms of capacity and security. Universiti Sains Islam Malaysian 2018-03 Thesis en https://oarep.usim.edu.my/handle/123456789/12445 https://oarep.usim.edu.my/bitstreams/4df18f50-b517-4e4e-85eb-755f85dfa780/download 8a4605be74aa9ea9d79846c1fba20a33 https://oarep.usim.edu.my/bitstreams/8beb8373-bfa8-4700-896c-61914a73fb69/download 6ff419d2a38e3e2ca8d14fac42dd9629 https://oarep.usim.edu.my/bitstreams/cea85fcf-7e3a-4579-9ab6-f10351f95bf9/download 5c091d9bb165cb00f8402fd5e4d99a7f https://oarep.usim.edu.my/bitstreams/cd8ad852-898c-4c60-be0c-3b7d1cdae875/download ab152d3e12e9bfbc44fba40d810cc782 https://oarep.usim.edu.my/bitstreams/3560d754-4bc9-4581-8064-69e2262b008f/download 23ea8f4cdc91c4b4280456174bf49fdd https://oarep.usim.edu.my/bitstreams/65a17fd2-a6f5-48e1-be0f-2e6de136cb78/download ccf11fe3b667924f63be6e74ed506d8e https://oarep.usim.edu.my/bitstreams/b1b0b24f-3415-4f5e-a55c-362b0cbe0d6b/download 711a9ccfe33779fc3563e4754ff6328a https://oarep.usim.edu.my/bitstreams/4e9b6d03-7bb7-4e1a-8a78-9d028931b3bb/download 9a9a22a81f4e4c75444618942528eaa4 https://oarep.usim.edu.my/bitstreams/ea4742ba-49a8-496a-b96b-abb798ae73f8/download 9c5653fc90614a10508f3181d14e11d0 https://oarep.usim.edu.my/bitstreams/ce59c12a-3755-4ddd-a49c-6a3bc61300bb/download 7a69ac5691b3da389789182724fe9d37 Quantum computing. Cryptography. steganography Data encryption (Computer science) Internet of things.
institution Universiti Sains Islam Malaysia
collection USIM Institutional Repository
language English
topic Quantum computing.
Cryptography.
steganography
Data encryption (Computer science)
Internet of things.
spellingShingle Quantum computing.
Cryptography.
steganography
Data encryption (Computer science)
Internet of things.
Anes Abdulgahar Shaker
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
description Cryptography and steganography are the most common methods for ciphering and hiding data, respectively. Cryptography is a technique uses mathematics to encrypt and decrypt data, where the data is converted into some other gibberish form, and then the encrypted data is transmitted. However, cryptography alone cannot guarantee that the data will be entirely secured because the scrambled message is still visible to the eavesdropper. On the other hand, steganography is the art and science of hiding conununication. Therefore, a stenographic system embeds hidden content in the unremarkable cover media such as text to avoid an eavesdropper's suspicion. Existing methods are still lacking in capacity and security. Hence, an enhanced hybrid method using existing Advanced Encryption Standard (AES) algorithm and new Arabic text steganography based on concept of lunar and solar letters is proposed. AES algorithm is chosen because symmetric encryption algorithm runs faster and performs better in smaller scale applications as compared to Asymmetric key algorithms. In addition, the memory requirement of Symmetric algorithm is lesser as compared to asymmetric. Five variations of text steganography methods namely Method A, Method B, Method C, Method D and Method E that consist of 28 Arabic letters classified into 14 solar letters and 14 lunar letters are proposed. Evaluation on capacity and security against three related existing methods were carried out. Capacity is evaluated using embedding ratio and efficiency ratio while security is evaluated using invisibility test. Invisibility test is carried out using a survey on random 100 Iraqi computer science students. Method A produces the highest embedding ratio 84.26% and the highest efficiency ratio 70.13%. In addition, method A produces the highest security with results of 100% from the invisibility survey when compared with four proposed and three existing methods. It is concluded that method A outweighs other methods in terms of capacity and security.
format Thesis
author Anes Abdulgahar Shaker
author_facet Anes Abdulgahar Shaker
author_sort Anes Abdulgahar Shaker
title An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
title_short An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
title_full An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
title_fullStr An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
title_full_unstemmed An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
title_sort enhanced hybrid method using aes algorithm and arabic text steganography
granting_institution Universiti Sains Islam Malaysian
_version_ 1812444792247812096