An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Cryptography and steganography are the most common methods for ciphering and hiding data, respectively. Cryptography is a technique uses mathematics to encrypt and decrypt data, where the data is converted into some other gibberish form, and then the encrypted data is transmitted. However, crypto...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-usim-ddms-12445 |
---|---|
record_format |
uketd_dc |
spelling |
my-usim-ddms-124452024-05-29T04:11:20Z An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography Anes Abdulgahar Shaker Cryptography and steganography are the most common methods for ciphering and hiding data, respectively. Cryptography is a technique uses mathematics to encrypt and decrypt data, where the data is converted into some other gibberish form, and then the encrypted data is transmitted. However, cryptography alone cannot guarantee that the data will be entirely secured because the scrambled message is still visible to the eavesdropper. On the other hand, steganography is the art and science of hiding conununication. Therefore, a stenographic system embeds hidden content in the unremarkable cover media such as text to avoid an eavesdropper's suspicion. Existing methods are still lacking in capacity and security. Hence, an enhanced hybrid method using existing Advanced Encryption Standard (AES) algorithm and new Arabic text steganography based on concept of lunar and solar letters is proposed. AES algorithm is chosen because symmetric encryption algorithm runs faster and performs better in smaller scale applications as compared to Asymmetric key algorithms. In addition, the memory requirement of Symmetric algorithm is lesser as compared to asymmetric. Five variations of text steganography methods namely Method A, Method B, Method C, Method D and Method E that consist of 28 Arabic letters classified into 14 solar letters and 14 lunar letters are proposed. Evaluation on capacity and security against three related existing methods were carried out. Capacity is evaluated using embedding ratio and efficiency ratio while security is evaluated using invisibility test. Invisibility test is carried out using a survey on random 100 Iraqi computer science students. Method A produces the highest embedding ratio 84.26% and the highest efficiency ratio 70.13%. In addition, method A produces the highest security with results of 100% from the invisibility survey when compared with four proposed and three existing methods. It is concluded that method A outweighs other methods in terms of capacity and security. Universiti Sains Islam Malaysian 2018-03 Thesis en https://oarep.usim.edu.my/handle/123456789/12445 https://oarep.usim.edu.my/bitstreams/4df18f50-b517-4e4e-85eb-755f85dfa780/download 8a4605be74aa9ea9d79846c1fba20a33 https://oarep.usim.edu.my/bitstreams/8beb8373-bfa8-4700-896c-61914a73fb69/download 6ff419d2a38e3e2ca8d14fac42dd9629 https://oarep.usim.edu.my/bitstreams/cea85fcf-7e3a-4579-9ab6-f10351f95bf9/download 5c091d9bb165cb00f8402fd5e4d99a7f https://oarep.usim.edu.my/bitstreams/cd8ad852-898c-4c60-be0c-3b7d1cdae875/download ab152d3e12e9bfbc44fba40d810cc782 https://oarep.usim.edu.my/bitstreams/3560d754-4bc9-4581-8064-69e2262b008f/download 23ea8f4cdc91c4b4280456174bf49fdd https://oarep.usim.edu.my/bitstreams/65a17fd2-a6f5-48e1-be0f-2e6de136cb78/download ccf11fe3b667924f63be6e74ed506d8e https://oarep.usim.edu.my/bitstreams/b1b0b24f-3415-4f5e-a55c-362b0cbe0d6b/download 711a9ccfe33779fc3563e4754ff6328a https://oarep.usim.edu.my/bitstreams/4e9b6d03-7bb7-4e1a-8a78-9d028931b3bb/download 9a9a22a81f4e4c75444618942528eaa4 https://oarep.usim.edu.my/bitstreams/ea4742ba-49a8-496a-b96b-abb798ae73f8/download 9c5653fc90614a10508f3181d14e11d0 https://oarep.usim.edu.my/bitstreams/ce59c12a-3755-4ddd-a49c-6a3bc61300bb/download 7a69ac5691b3da389789182724fe9d37 Quantum computing. Cryptography. steganography Data encryption (Computer science) Internet of things. |
institution |
Universiti Sains Islam Malaysia |
collection |
USIM Institutional Repository |
language |
English |
topic |
Quantum computing. Cryptography. steganography Data encryption (Computer science) Internet of things. |
spellingShingle |
Quantum computing. Cryptography. steganography Data encryption (Computer science) Internet of things. Anes Abdulgahar Shaker An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography |
description |
Cryptography and steganography are the most common methods for ciphering and hiding
data, respectively. Cryptography is a technique uses mathematics to encrypt and decrypt
data, where the data is converted into some other gibberish form, and then the encrypted
data is transmitted. However, cryptography alone cannot guarantee that the data will be
entirely secured because the scrambled message is still visible to the eavesdropper. On the
other hand, steganography is the art and science of hiding conununication. Therefore, a
stenographic system embeds hidden content in the unremarkable cover media such as text
to avoid an eavesdropper's suspicion. Existing methods are still lacking in capacity and
security. Hence, an enhanced hybrid method using existing Advanced Encryption
Standard (AES) algorithm and new Arabic text steganography based on concept of lunar
and solar letters is proposed. AES algorithm is chosen because symmetric encryption
algorithm runs faster and performs better in smaller scale applications as compared to
Asymmetric key algorithms. In addition, the memory requirement of Symmetric
algorithm is lesser as compared to asymmetric. Five variations of text steganography
methods namely Method A, Method B, Method C, Method D and Method E that consist
of 28 Arabic letters classified into 14 solar letters and 14 lunar letters are proposed.
Evaluation on capacity and security against three related existing methods were carried
out. Capacity is evaluated using embedding ratio and efficiency ratio while security is
evaluated using invisibility test. Invisibility test is carried out using a survey on random
100 Iraqi computer science students. Method A produces the highest embedding ratio
84.26% and the highest efficiency ratio 70.13%. In addition, method A produces the
highest security with results of 100% from the invisibility survey when compared with
four proposed and three existing methods. It is concluded that method A outweighs other
methods in terms of capacity and security. |
format |
Thesis |
author |
Anes Abdulgahar Shaker |
author_facet |
Anes Abdulgahar Shaker |
author_sort |
Anes Abdulgahar Shaker |
title |
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography |
title_short |
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography |
title_full |
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography |
title_fullStr |
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography |
title_full_unstemmed |
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography |
title_sort |
enhanced hybrid method using aes algorithm and arabic text steganography |
granting_institution |
Universiti Sains Islam Malaysian |
_version_ |
1812444792247812096 |