Image Encryption and Steganography Method Based on AES Algorithm and Secret Sharing Algorithm

Image Encryption and Steganography Method Based on AES Algorithm and Secret Sharing Algorithm

Mustafa Muslih Shwaysh Sameer Alani* Mohammed Ayad Saad Tabarak Ali Abdulhussein

College of Education for Humanities, University of Anbar, Anbar 5543, Iraq

Computer Center, University of Anbar, Anbar 5543, Iraq

Department of Medical Instrumentations Technique Engineering, Al-Kitab University, Kirkuk 36001, Iraq

Department of Computer Technology Engineering, College of Information Technology, Imam Ja’afar Al-Sadiq University, Baghdad 10011, Iraq

Corresponding Author Email: 
sameer.h@uoanbar.edu.iq
Page: 
705-714
|
DOI: 
https://doi.org/10.18280/isi.290232
Received: 
23 November 2023
|
Revised: 
27 March 2024
|
Accepted: 
8 April 2024
|
Available online: 
25 April 2024
| Citation

© 2024 The authors. This article is published by IIETA and is licensed under the CC BY 4.0 license (http://creativecommons.org/licenses/by/4.0/).

OPEN ACCESS

Abstract: 

The development that occurred in information technology and the need to transfer knowledge made sensitive information protection very necessary. The key exchange method is an important method between two sides, the sender side, and the receiver side, especially with the use of the symmetric algorithm, the key exchange method achieves two important principles secrecy and authentication. This article presents a new method for the protection of a secret grayscale image. The proposed work is composed of four phases. The initial phase is the key generation. Then the encryption process will be implemented by using the proposed AES encryption algorithm with multiple S-boxes determined by the number of rounds of the algorithm. The third phase applies secret sharing using the Shamir secret sharing scheme (SSSS). The SSSS will split the encryption key of the encryption algorithm that was generated randomly in the previous phase into several shares that will be distributed over multiple locations. The final phase is steganography, which will embed the secret image into an appropriate cover image using the Least Significant Bit (LSB). The obtained results prove that the secret image is completely restored without any change. The reconstruction of the stego image of quality test results was very good with PSNR 46.165 and MSE 1.58.

Keywords: 

Advanced Encryption Standards (AES) algorithm, Shamir secret sharing (SSS), hiding of encryption key with secret sharing, PSNR and MSE

1. Introduction

Due to the growth of threats to multimedia information, the demand for multimedia information security that transmits from one side to another has increased. Finding the best-secured method for transmission represents the main challenge [1]. Security is essential for the protection of secret information for storage, and transfer between objects to make sure that there is no distortion, or manipulation allowed on that secret information. In the field of multimedia information security, various techniques are employed to protect sensitive data during transmission. Two important methods used for this purpose are visual cryptography and steganography. Visual cryptography includes converting the original image to different layers that appear randomly and can be retrieved to restore the original image. Besides, the implementation technique can be classified into different techniques such as xor-based and algorithmic methods [2, 3]. Moreover, the steganography algorithm works in covering or hiding information such as audio files, videos, and images. In this article, the proposed method for image encryption, secret sharing, and steganography demonstrates resilience against potential attack vectors. Cryptanalysis attacks are mitigated by utilizing the AES encryption algorithm with multiple S-boxes, which is a recognized and secure algorithm. Brute force attacks are hindered using secret sharing with the Shamir scheme and enforcing strong encryption keys. Steganalysis attacks are addressed by employing the LSB technique, although more advanced steganographic techniques could enhance system robustness. Collusion attacks are mitigated by requiring a minimum threshold of shares for key reconstruction. While side-channel attacks are not explicitly mentioned, incorporating secure algorithms, constant-time implementations, and physical security measures can protect against them. A comprehensive security analysis, considering implementation details and adherence to best practices, is essential to ensure the system's resilience against vulnerabilities and potential attack scenarios. One of the most used techniques of security is the cryptography technique; it deals with the technique of transforming the understandable and readable form into an understandable and vague form. The key power, which regulates the user's access to confidential information, is essential to both encryption and decryption processes. Depending on how the cryptographic keys are used, there are two types of cryptography: symmetric key cryptography and asymmetric key cryptography. Cryptography may be applied in a variety of ways [4, 5]. Secret sharing is the most used technique for information sharing to store sensitive and important information. It is implemented by splitting and distributing that information among several participants to increase the confidentiality and reliability of the secret information. The main benefit of secret sharing is the addressing of the problems by making a high level concerning the confidentiality and reliability objectives achieved [6]. Shamir's secret sharing scheme is the most known algorithm for secret sharing, Adi Shamir and George Blakley invented it in 1979. It enables the process of splitting the secret information (s) into many parts (n), so any number of pieces (n) with a number of shares (k) can rebuild the secret information(s). The secret cannot be exposed with (k-1) pieces so the information will be kept safe and secret, this scheme is known as a (n, k) threshold scheme. The secret sharing scheme is known as the perfect scheme if (k) can recover all the secret information (s) while the fake or unauthorized (k) will not be allowed to recover any piece of information from the secret (s). This scheme is to enhance convenience and practicality when multiple users are required to perform authorized actions [7]. Steganography is a scheme applied to increase the security of information by hiding secret information in a cover message [8]. Steganography works for sensitive information as a mask by hiding that sensitive information in a particular carrier. The main goal of this technique is to make the sensitive information undetectable [9].

2. Related Works

Numerous techniques and methods developed in the field of information security such the cryptography, secret sharing, and steganography. Many types of research concerning the secret-sharing scheme. conducted a developed method of visual cryptography to transmit the original image protected by confidentiality and secret sharing and from a secret color image RGB band of pixel values forming separate matrices (Ri, Gi, Bi) [10]. The proposed method is highly security against any deceitful shares that altered the original shares, so it secures the shares secret efficiently it also minimizes the PSNR value and has a fast image encryption execution. Moreover, Shankar and Eswaran [9] proposed a method of using visual cryptography (encryption and decryption) to an image that differs in size and a particular length of the message with embedding time. The proposed method provides a high level of security because of the robust shares that have immunity against different attacks. Also, the binary secret shares vulnerability is surpassed by hiding the shares in some images. Another study proposed a method of making secret sharing more secure since the secret sharing divides the secret into several pieces, each piece sent to a participant to keep it safe and to prevent the attackers from knowing that piece [11]. The developer noticed the shares or pieces could be compromised so the proposed work by using the Shamir secret sharing tries to prevent the attackers from outside and inside, to keep it secret and safe by using fake shares sent with the real shares to the participants. Moreover, Rajput et al. proposed a method of encrypting a secret image SI with n cover images Ci by using the concept of a secret sharing scheme. The proposed method gives very high security and if any shares are altered will not reveal any information or partial information and any attack will affect the secret also the proposed image works on both gray scale and colored image. Furthermore, Wang and Gao [12] has proposed a method of using cryptography and secret sharing for an image to have a high degree of confidentiality while transmitting. The security requirement in the proposed method is satisfied also the visual testing and the encryption testing performance are high. In another study [13], the author proposed a method for studying information security in cloud computing to handle the issues related to cloud computing. The focus of the proposed work is about the symmetric and asymmetric encryption keys of the encryption algorithms. The proposed technique applies different encryption algorithms such as the AES, DES, 3DES, RSA, and Elliptic Curve. To decide on which algorithm is more secure for enhancing the security of data in the cloud computing system. Kambl and Patil [14] proposed a method of protecting secret information from outside attacks while transmission forms one side to another. Secret sharing is a scheme that is utilized to separate the secret into several shares and distributing it among several locations. Moreover, the recovery process needs several shares that have been distributed to rebuild the secret. The proposed work mainly focuses on the process of reconstruction of cover image quality which should be the same as the original before the hiding process of the secret inside the cover image. Another study was conducted by using a matrix semi-tensor product for a chaotic encryption algorithm image along with a secret key [15]. The initial image plaintext pixels were divided randomly into blocks. The resulting block of pixels is subjected to various Arnold transformation rounds, and the resulting blocks are then concatenated to get the scrambled image. After that, a secret key is developed. A collection of pseudo-secret keys is then filtered using a synchronous Boolean network that is updated for the real secret key generation. The initial value uses a secret key as of the Mixed Linear Non-Linear Coupled Map Lattice System for generating sequential chaos. Finally, the Semi-Tensor Product operation is applied to the sequential chaotic plus the scrambled image for an encrypted image generation. In contrast to other encryption algorithms, the algorithm proposed is more effective and secure, it also works for image encryption with colors. The proposed method of Fractal Sorting Matrix is a class of sorting matrices with fractal properties and results iterative calculation method [16]. To improve the security of the encryption algorithm effectively, the new cluster of matrices scrambles information or images. High encryption efficiency and good security resulted from a new technique of the diffusion of global pixels with two sequential chaotic. This paper constructs a more secure and efficient chaotic image encryption algorithm in contrast to other techniques. The proposed algorithm has a higher rate (in association with Shannon entropy) and is faster too. Data in ant-differential attack (test) are smaller in terms of the fluctuation of data and close to theoretical values. Also, the images that are obtained from the noise attacks and cropping are clearer. As a result, the proposed method results in more resistance to different attacks and security. Finally, a study was proposed by Al-Ghamdi et al. [17]. The article presented a Combination Chaotic System which involves image encryption. A larger key space plus the exhibition of more efficient cryptographic features than their original 1-D chaotic map is proposed. Moreover, due to using the NCCS, a new scheme of bit-level image encryption is produced. The scheme core includes generating the plaintext that relates to the key streams (using SHA-512 Hash) and random decimal points sequence, the NCCS bit-level operations of the image plus the confusion and diffusion. The results show the proposed algorithm's effectiveness in high-security terms, as well as demonstrating better chaotic behavior. In this article, a novel approach for protecting secret grayscale images based on advanced encryption and steganography. The proposed framework comprises four phases: key generation, encryption, secret sharing, and steganography. The method starts by generating the key. After generating the key, the advanced AES encryption algorithm with multiple S-boxes are introduced to encrypt secret grayscale image. Then, the Shamir secret sharing scheme is applied to split the encryption key for more reliability. Lastly, during the steganography phase, we introduced the LSB technique in order to cover the image (see Figure 1). In addition, a comparison must be conducted with the recent works to show and validate the strength of the proposed method since most of the literature review studies show several challenges in protecting information and susceptibility to attacks. Thus, this article suggests a new framework by introducing advanced encryption techniques, secret-sharing schemes, and steganography to address these limitations.

Figure 1. (a) encryption key distribution (b) steganography

The secret image's dependability is guaranteed throughout the encryption stage. By dividing the encryption key, the secret sharing step provides an additional degree of security. The steganography phase further hides the secret picture under a cover image, making it more difficult for adversaries to find or extract the secret data. In addition, the suggested method seeks to strike a balance between visual quality and security. The reconstructed stego picture demonstrated good performance in the quality test results, with a low mean squared error (MSE) of 1.58 and a high peak signal-to-noise ratio (PSNR) of 46.165. This proofs that the suggested framework successfully maintains the secret image's confidentiality while preserving its aesthetic appeal.

3. Advanced Encryption Standards (AES) Algorithm

The need for protection of sensitive, secret, or private data and information requires specific ways and methods to keep that data or information safe. In the digital world, one of the most famous methods called encryption is used to keep that data and information safe, the encryption is a process of transforming readable data or information into an unreadable form or unrecognizable and only the people with authorization can access and use that data and information and modify it. The AES algorithm is very important in the communication field and information security. It is a symmetric (one-key) algorithm used for encryption and is considered one of the most powerful algorithms. The main reason that the AES was created was to fix the flaws and improve issues found in the DES (Data Encryption Standard).

4. Secret Sharing Scheme (SSS)

Secret sharing is the most widely used technique for information sharing to store sensitive and important information. Is an important concept in cryptography that takes a secret input, divides it into several pieces and distributes it between several users or participants. Shamir secret sharing scheme is the most known algorithm for secret sharing, Shamir and Blakley. It enables the process of splitting the secret (s) into (n) parts with any (k) out of (n) pieces that can be rebuilt as original secret (s). The basic idea of the creation of Shamir's secret sharing was for the protection of cryptographic keys. The purpose of the scheme is to improve convenience and practicality when multiple users are required to perform authorized actions.

5. Peak Signal-To-Noise Ratio and Mean Square Error

In order to evaluate the proposed method, there are two important metrics that should be measured which are MSE and PSNR. MSE is mean square error between the covered and stego image while PSNR indicates the quality of the image. Both metrics can be defined as follows:

$P S N R=10 \log 10 \frac{255^2}{M S E}$            (1)

$M S E=\left(\frac{1}{N}\right)^2 \sum_{i=1}^N \sum_{j=1}^N(x[i, j]-\underline{x}[i, j])^2$            (32)

6. The Proposed System

The proposed metho is divided into four phases as presented in Figure 2. Each phase has a specific task to achieve the highest levels of security. The first step is the generation of a random key by the proposed method to be used later. The second phase utilizes the AES algorithm for encryption process and produces a cipher image. The third step, using the secret sharing scheme to increase the security of the secret. The fourth step, the steganography step uses the LSB algorithm for hiding the secret inside a cover image.

Each phase has several steps to be implemented. The detail of these steps and the proposed method is shown in Figure 3.

6.1 Step 1: Random key generation algorithm

The proposed key generation algorithm called (KEY-GENR) as presented as algorithm 1 creates the secret key that will be the encryption key of the encryption algorithm in a random manner. The size of the produced key from the algorithm KEY-GENR will be 256-bit and it will be used as input to the Shamir secret sharing algorithm to be distributed over many locations or participants to keep that key secret from unauthorized people.

The pseudocode of step 1 is shown below as algorithm 1.

Algorithm 1: Key generator Algorithm KEY-GENER

1 Input: Secret Key 256-bit, Register (X, Y, Z)

2 Output: Random Secret Key with 256-bit length

3 Start:

4     Step1: Assign a value to a variable called (Polynom).

5     Step2: Multiply the polynom * 16 to specify the no. of bits to the key will be generated      (in the proposed method the key will be 256-bit so the polynom will be assigned to 16)

6     Step3: Divide the 256-bit over 8 times to specify the bytes numbers of bytes will be store in the register X.

7     Step4: take the result from the register and put it in a byte array and then utilize random function to produce  random numbers to the key

8      X  ByteArray

9       ByteArray   Key

10     Random (Key)

11     Step5: Divide the Key length over 2

12            For i=1 to length/2

13            Array [ 2*i] << 8  Y

14            Array [ 2* i + 1]  Z

15            Y+Z   W[i]

16     Step6: Converting the result key 256-bit into hex

17             For j= 1 to Keylength

18                   ToHexStr(Key)

19             End

6.2 Step 2: Encryption process using AES algorithm

The secret image's dependability is guaranteed throughout the encryption stage. By dividing the encryption key, the secret sharing step provides an additional degree of security. The steganography phase further hides the secret picture under a cover image, making it more difficult for adversaries to find or extract the secret data. In addition, the suggested method seeks to strike a balance between visual quality and security. The reconstructed stego picture demonstrated good performance in the quality test results, with a low MSE of 1.58 and a PSNR of 46.165. This suggests that the suggested framework successfully maintains the secret image's confidentiality while preserving its aesthetic appeal. increased by the many S-boxes. Multiple S-boxes provide diversity, which makes it more difficult for an attacker to succeed in an attack by forcing them to crack multiple separate encryption layers. The number of S-boxes makes the secret much more secure. Figures 4, 5, 6, and 7 illustrate one S-Box and IS-Box and two S-Box, IS-Box, three S-Box and IS-Box, and the fourth S-Box and IS-Box.

Algorithm 2: AES Encryption Algorithm

1  Input: Gray image, Secret Random Key

2  Output: Ciphered image

3  Start:

4        Step1: Choose the key size (128,192or 256 bit) will determine the Nr (10,12 or 14)

5        Step2: Palin image (Original image).

6        Step3: Plain image XOR RoundKey (0)

7        Step4: Create-SubBytes().

8         For i = 1 to Nr (rounds number) // the rounds number can be (10, 12 or 14)

9               Start:

10                     For r = 0 to 16

11                          Start:

12                                For c = 0 to 16

13                                     Start:

14                                            Multiplicative inverse[r,c]  Value

15                                            Find S-box (value, Round-Key[i], i)    b

16                                            Fill S-box (r, c, value, i+1)

17                                       End

18                           End

19               End

20    Create Inverse S-Box()

21               For r = 0 to 4

22                     Start:

23                           For c = 0 to 4

24                                Start:

25                                        State[r,c] & 0x0f    y

26                                        (State[r,c] >> 4) & 0x0f   x       

27                                        Switch (Key_Enc[i])

28                                                Start:

29                                                        Isub1[x,y]   State[r,c]

30                                                 End

31                                   End

32                      End

33   Creat_Ibox()

34                    Start:

35                          For counter = 0 to NR

36                              Start:

37                                    Switch (counter)

38                                    Fill_Ibox(sub1, Isub1);

39                             End

40                    End

41                                    End

42    ShiftRows.

43    MixColumn.

44    Add RoundKey (MixColumn XOR RoundKey).

45  Step5: If i = Nr

46   SubBytes.

47   ShiftRows.

48   Add RoundKey (ShiftRows XOR Add RoundKey(NR)).

49  Step6: Output (Cipher Image).

50  End

Figure 2. The entire flowchart of the proposed method

Figure 3. Illustrate the steps of the proposed work

Figure 4. Illustrate the following is the one S-Box and IS-Box

Figure 5. Illustrate the following is the two S-Box and IS-Box

Figure 6. Illustrate the following the three S-Box and IS-Box

Figure 7. Illustrate the following is the fourth S-Box and IS-Box

6.3 Shamir secret sharing algorithm

The Shamir secret sharing is one of the most known and widely used algorithms. The secret random key created by the (KEY-GENER) algorithm will be used as input to the Shamir algorithm. The Shamir secret-sharing algorithm will process the secret encryption key and will produce several shares distributed to several participants or locations. These shares will be used later to rebuild the secret key for the decryption process. Shamir's (3, 4) threshold secret sharing generates four shares of the secret encryption key. The pseudocode of Shamir's secret sharing algorithm is presented below as algorithm 3.

Algorithm 3: Shamir (3, 4) threshold secret sharing

1 Input: Secret Encryption Key (256-bit), n=4, k=3

2 Output: Four shares of key

3 Start:

4       Step1:  For i = 1 to key length

5           Begin

6                  Read key row (i)

7                  Reading the random points from (key row(i), n)

8      Step2: For j = 1 to n

9                        f(x) =

10                      shares(x) = key length *2

11                      Produce the shares (x.share(x))

12                End for

13    Step3: Repeat step1 and step2 until whole key processed

14        End

6.4 The proposed hiding technique of encrypted image

The encrypted image that resulted from the AES encryption algorithm and the hashing value is hidden inside the colored cover image using the Least Significant Bit (LSB) method. The LSB method will hide the encrypted image values inside cover image pixels by transforming the secret image into a matrix. The next step will be taking the index of each character that wants to be hidden in a cover image, by transforming each character into an integer consequently taking that value of the character and holding the color element (R or G or B) index that currently processed. Algorithm 4 illustrates the pseudocode of the LSB step.

Algorithm 4: Generating a position of cover image pixels by using (LSB)

1 Input: Cover image, Encrypted image

2 Output: Cover Image with Hidden Secret Image Pixels Inside 

3 Start:

4        Step1: State matrix hiding   State matrix

5        Step2: Holds the index

6                   0    charIndex

7      value of the character that converted and the value of convert that character into integer

8                0   charValue

9        holds the color element (R or G or B) index that currently processed

10              0   pixelElementIndex

11     Step3: For i = 1 to height of image image

12                     For j = 1 to width of image

13                         Begin

14                               Getpixel (j,i)   Pixel

15                               Clear each LSB from pixel element

16                                    R - R % 2.

17                                    G - G % 2.

18                                    B - B % 2.

19     Step4: For k = 1 to 3

20              Begin

21                     Check if whole process has finished 

22                           If 0   Pixel indix % 8

23                                     It is finish when 8 zeros added

24                          8  State matrix

25                     Return Image

26                End for

29   End 

7. Encryption Key

The encryption key used by the encryption process is 256-bit length; it is generated randomly by a proposed key generation method. After the key generation process, it will be used in the process of encryption. When the encryption process is finished the Shamir secret sharing is applied to the key to encryption, and the result will be generating four shares that will be distributed to many participants, the threshold of shares that are needed to reconstruct the original key is three shares as presented in Figure 8.

Figure 8. (a) original encryption key, (b) the shares of the secret key after applying the Shamir secret sharing scheme of (3,4) threshold, (c) the reconstructed encryption key

8. Experimental Results

To achieve the best results, several measuring factors are used. The evaluation factors include entropy, CC, NCPR, AUCI, and the PSNR with the MSE. The tests applied for the evaluation of the system performance of the proposed work. Figure 9 clarifies the difference in histogram between plain and encrypted Lena gray images of size 64 × 64 pixels.

8.1 Number of changing pixel rate and unified averaged changed intensity

The NPCR and UACI, the NPCR calculate the different pixels of total pixels in the image, and it must be close the 100%. The UACI measures average intensity among several images; it is preferred to be greater than 33%. Both coefficients are used to measure the strength of the encryption algorithm against attacks like deferential attacks. The result of the NPCR and UACI shows the encryption algorithm is strong against attacks. The results show that the encryption algorithm used for the encryption process is very good and secure. As illustrated in Tables 1 and 2.

8.2 The entropy of gray images

The entropy measurement between the original image and the ciphered image the result shows that there is an increase in the entropy value after the process of the encryption, this means the distortion in the ciphered image is increased. The encryption process results are very good according to the experiments of the entropy coefficient. As illustrated in Table 3. Moreover. correlation coefficients are statistical measures that quantify the degree of linear relationship between two gray-scale images. These coefficients provide a measure of how similar or related two images are in terms of their pixel values. Figure 10 illustrates the correlation coefficients of gray images.

Figure 9. (a) original image (64 x 64), (b) the histogram of the original image (c), the encrypted image (d) the histogram of the encrypted image

Table 1. Illustrate the NPCR and UACI between the plain and cipher image

Gray Image

NPCR%

UACI%

Lena

99.63%

33.21%

Pepper

99.60%

33.33%

Baboon

99.61%

33.20%

Table 2. Illustrate the NPCR and UACI between two ciphered images

Ciphered Images

NPCR%

UACI%

Lena, Pepper

99.63%

33.37%

Lena, Baboon

99.60%

33.48%

Pepper, Baboon

99.61%

33.46%

Table 3. Illustrate the original image and Entropy for the plain and cipher image and the gray correlation coefficient between the plain and cipher image

Test Image

Entropy for Plain Image

Entropy for Cipher Image

Correlation

Coefficient

Lena

7.4451

7.9919

-0.076

Baboon

7.3577

7.9916

0.0013

Pepper

7.5936

7.9916

-0.0026

(a)

(b)

(c)

(d)

(e)

(f)

(g)

(h)

Figure 10. The correlation coefficients of gray images

8.3 PSNR and MSE

The experiment result shows that the stego image is a high-quality image because the PSNR is high and the MSE is low so the produced stego image of the proposed system is very good in quality. as illustrated in Table 4. Besides, Figure 11 presents the comparison of the original cover image with a histogram of the cover image and stego image.

Table 4. Illustrate the quality of the cover image and stego image

Test Image

Dimension Cover Image

Dimension Secret Image

MSE

PSNR

Lena

512 x 512

64 x 64

1.58

46.165

Baboon

512 x 512

64 x 64

1.59

46.149

Barbara

512 x 512

64 x 64

1.61

46.101

Figure 11. (a) the original cover image (512 × 512) (a1) the histogram of the cover image, (a2) the stego image (512 × 512), (a3) the histogram of stego image

In this research, a novel approach for protecting secret grayscale images based on advanced encryption and steganography was presented. The proposed framework comprises four phases: key generation encryption, secret sharing, and steganography. Through the encryption phase, the secret grayscale image is encrypted using the advanced AES encryption algorithm with multiple S-boxes determined by the number of rounds. During the secret sharing phase, the Shamir secret sharing scheme has been used to separate the encryption key to ensure the security of secret data transmission. Lastly, the LSB has been applied to cover the image. Moreover, the system has been compared with recent works in terms of security performance, confidence, reliability, and robustness. The proposed system has been compared with [18] and the results show better achievement due to using multiple S-boxes in the encryption phase. Moreover, the proposed method have been compared with [19, 20]. The integration of the proposed method in this article proves to provide better achievement in protecting secured information during transmission due to the steganography technique.

9. Conclusions

In this article, a new method to secure the transmission of data and information on the network. The process involves several phases by using the AES algorithm with a size of 128-bit for the data block to implement the encryption phase while the encryption key is generated in a random way to increase the ambiguity of the encryption. Moreover, the secret sharing scheme is applied to separate the secured information key into four shares. in addition, to provide a high protection level, the steganography technique is used to cover the secret information in a cover-colored image by applying the LSB algorithm. The integration of the proposed technique has contributed to providing more security and confidently transmitting data from one side to another. The proposed method offers an optimal solution for protecting transferred data. In addition, the proposed method restores the secured image without changes resulting in high correlation coefficients between the secured image and the retrieved image. The results show a satisfactory impact of the proposed method by achieving a high PSNR of 46.165 and a low MSE of 1.58. This achievement of results proves the effectiveness of the proposed method in securing the transmitted data.

Acknowledgment

The authors would like to thank the University of Anbar for supporting this project.

  References

[1] Gayathri, R., Nagarajan, V. (2015). Secure data hiding using steganographic technique with Visual cryptography and watermarking scheme. 2015 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, India, pp. 118–123. https://doi.org/10.1109/ICCSP.2015.7322691 

[2] Hadj Brahim, A., Ali Pacha, A., Hadj Said, N. (2023). An image encryption scheme based on a modified AES algorithm by using a variable S-box. Journal of Optics, 53: 1170–1185. https://doi.org/10.1007/s12596-023-01232-8 

[3] Harn, L., Lin, C., Li, Y. (2015). Fair secret reconstruction in (t, n) secret sharing. Journal of Information Security and Applications, 23: 1–7. https://doi.org/10.1016/j.jisa.2015.07.001 

[4] Jiang, N., Zhao, N., Wang, L. (2016). LSB based quantum image steganography algorithm. International Journal of Theoretical Physics, 55(1): 107–123. https://doi.org/10.1007/s10773-015-2640-0 

[5] Rajput, M., Deshmukh, M., Nain, N. (2017). A novel approach for concealing image by utilizing the concept of secret sharing scheme and steganography. Proceedings-2016 15th International Conference on Information Technology (ICIT), Bhubaneswar, India, pp. 51–56. https://doi.org/10.1109/ICIT.2016.023 

[6] Rao, S.K., Mahto, D., Khan, D. A. (2017). A survey on advanced encryption standard. International Journal of Science and Research, 6(1): 711-724. https://doi.org/10.21275/art20164149 

[7] Hashim, J., Hameed, A., Abbas, M. J., Awais, M., Qazi, H. A., Abbas, S. (2018). LSB Modification based audio steganography using advanced encryption standard (AES-256) technique. In 2018 12th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Karachi, Pakistan, pp. 1-6. https://doi.org/10.1109/MACS.2018.8628458

[8] Islam, M.R., Siddiqa, A., Uddin, M.P., Mandal, A.K., Hossain, M.D. (2014, May). An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography. In 2014 International Conference on Informatics, Electronics & Vision (ICIEV), Dhaka, Bangladesh, pp. 1-6 https://doi.org/10.1109/ICIEV.2014.6850714

[9] Shankar, K., Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70: 462–468. https://doi.org/10.1016/j.procs.2015.10.080 

[10] Shankar, K., Eswaran, P. (2016). A new k out of n secret image sharing scheme in visual cryptography. Proceedings of the 10th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, pp. 1-6. https://doi.org/10.1109/ISCO.2016.7726969

[11] Wakure, M.A., Holambe, A.N. (2015). A discrete wavelet transform: A steganographic method for transmitting images. International Journal of Computer Applications, 129(5): 26-29. https://doi.org/10.5120/ijca2015906915

[12] Wang, X., Gao, S. (2020). Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Information Sciences, 539: 195–214. https://doi.org/10.1016/j.ins.2020.06.030

[13] Xian, Y., Wang, X. (2021). Fractal sorting matrix and its application on chaotic image encryption. Information Sciences, 547: 1154–1169. https://doi.org/10.1016/j.ins.2020.09.055 

[14] Kamble, P.R., Patil, S. (2018). Exploring secret image sharing with embedding of shares. In Proceedings of the 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, pp. 1090-1093. https://doi.org/10.1109/ICISC.2018.8398972 

[15] Yassein, M.B., Aljawarneh, S., Qawasmeh, E., Mardini, W., Khamayseh, Y. (2017). Comprehensive study of symmetric key and asymmetric key encryption algorithms. Proceedings of 2017 International Conference on Engineering and Technology (ICET), Antalya, Turkey, pp. 1–7. https://doi.org/10.1109/ICEngTechnol.2017.8308215 

[16] Zhou, W., Wang, X., Wang, M., Li, D. (2022). A new combination chaotic system and its application in a new Bit-level image encryption scheme. Optics and Lasers in Engineering, 149: 106782. https://doi.org/10.1016/j.optlaseng.2021.106782 

[17] Al-Ghamdi, M., Al-Ghamdi, M., Gutub, A. (2019). Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimedia Tools and Applications, 78(12): 16283-16310. https://doi.org/10.1007/s11042-018-6977-2 

[18] Arab, A., Rostami, M.J., Ghavami, B. (2019). An image encryption method based on chaos system and AES algorithm. Journal of Supercomputing, 75(10): 6663-6682. https://doi.org/10.1007/s11227-019-02878-7 

[19] Dahat, A.V., Chavan, P.V. (2016). Secret sharing based visual cryptography scheme using CMY color space. Physics Procedia, 78: 563-570. https://doi.org/10.1016/j.procs.2016.02.103 

[20] De Los Reyes, E.M., Sison, A.M., Medina, R. (2019). Modified AES cipher round and key schedule. Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 7(1): 29-36. https://doi.org/10.1109/iciibms.2018.8549995