<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Secure Method to Hide Confidential Data Using Cryptography and Steganography</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>John K. Alhassan</string-name>
          <email>1jkalhassan@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Idris Ismaila</string-name>
          <email>2ismi.idris@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Victor O. Waziri</string-name>
          <email>3victor.waziri@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Adamu Abdulkadir</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Cyber Security Science, Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>105</fpage>
      <lpage>110</lpage>
      <abstract>
        <p>-The rate at which encrypted messages are being sent over the internet and other electronic means will easily capture the attention of hackers and possibly make them try to disrupt or even hack those messages so as view the original message. Steganography is designed to hide the presence of a message by hiding the secret message inside an innocent file. For effective security, steganography is sometimes combined with cryptography. In this paper, steganography and cryptography are combined to provide a robust system capable of encrypting a secret message using RSA algorithm. To hide the message, advanced LSB method is used. The original message is encrypted at the initial stage and then separated into two portions P1 and P2. An XOR operation is applied to the first portion (P1) using the odd location and to the second portion (P2) using the even position of the LSB+1.The Position of the LSB is then used to hide the XORed encrypted message.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Keywords-cryptography; RSA algorithm; steganography;
Least Significant Bit</p>
      <p>I.</p>
      <p>INTRODUCTION</p>
      <p>
        Cryptography and steganography are used to manipulate
information so as to scramble or hide it. These techniques
have a goal which is to protect the confidentiality, integrity
and availability of information from unauthorized access [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Intruders or hackers can be successful easily due the fact
that the information they usually obtain from computer
systems is in a form that can be read easily and understood
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. They may decide to reveal such information to their
friends, modify it in order to misrepresent organizations,
individuals, or even use it to carry out a serious attack. A
viable solution to this issue is the use of advanced
steganography. Advance steganography is defined as a
technique of hiding information in digital form and then
encrypting it. Contrary to cryptography, its goal is not to
keep the information hidden from others but for them not to
think the information even exist [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Steganography is
derived from two Greek words steganos meaning “covered”
and graphia which means “writing”, We could therefore
define steganography as “covered writing”. The goal of
steganography is hide the existence of a message. Digital
images, videos, sound etc. are used as a carrier file to embed
confidential information. Cryptography is a technique for
encrypting plaintext and generating cipher text. A data that
can be read easily and understood without the need for any
software to decipher or decode it is known as plaintext or
clear text. Changing the plaintext or clear text into one that
cannot be easily understood is known as cipher text [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The
method of disguising the clear text or plaintext so as to hide
its substance is known as encryption. Generally,
Cryptography scrambles information by maintaining the
secrecy of such information and enable it to be transferred
across an insecure channel so that unauthorized parties
cannot understand it [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. There are two other techniques that
are related to steganography. These are watermarking and
fingerprinting. They are concerned with the protection of
intellectual property [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        The two main branches of cryptography are cryptanalysis
and cryptology. Cryptanalysis refers to applying different
method so as to break into a system or cipher text without
having the knowledge of the key. This is also referred to as
breaking the cryptosystem [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Below are the four parts of all
cryptographic process.
      </p>
      <p></p>
      <p>Plaintext: Clear text or unscrambled text to be sent to
another person or entity over the network. It could be
a simple text document, personal information, a
simple text document to be transmitted over the
network.</p>
      <p>Cipher text: Cipher text refers to information that
have been scrambled and difficult to understand by
others unless with the knowledge of the correct key
e.g. encrypted text to be transmitted over the
network.</p>
      <p>
        Key: This refers to formula, mathematical value or
process that can be used to encode or decode a
message. Keys are used to convert messages or
information to a cipher text [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>Cryptographic Algorithm: This could take a form of
formula which can be used to encrypt or scramble a
plain message into a form that cannot be easily
understood by anybody unless with the knowledge
of the key.</p>
      <p>Basically, cryptographic algorithms can be broadly
divided into two categories:
the knowledge of the private key. Examples of public key
cryptosystems includes RSA, Elgamal Encryption,
DiffieHellman. etc. Fig. 3 shows how the process works.</p>
      <p>Stream algorithms (cipher): It operates on plaintext
considering one byte at a time, where 1 byte can be
special character, number, or character.</p>
      <p>Block algorithms (cipher): This algorithm operates
on clear text, usually in groups of bytes called
Blocks (Block algorithm). 64 bytes is the block size
for modern algorithms, small enough to work with
but large enough to deter code- breakers.
Unfortunately, these days especially with the speed
of the microprocessors, it is easy to break a 64-byte
algorithm using the method of brute force.</p>
      <p>For securing data, the following types of cryptographic
schemes are used.</p>
      <p> Secret Key Cryptography (SKC): This is also
referred to as symmetric- key cryptographic scheme
which used a single key to perform both encryption
and decryption. An example of this type of
cryptosystem is AES (Advance Encryption
Standard).</p>
      <p>Fig. 2 is the illustration of the steps in secret key
cryptography for a secure data transmission.</p>
      <p>Even though this system is designed to improve the data
security, its main problem lies on the distribution of keys
between a sender and receiver. Therefore, for secure
communication the key security becomes an issue with this
approach.</p>
    </sec>
    <sec id="sec-2">
      <title>A. Public key Cryptography (PKC):</title>
      <p>
        This is also referred to as asymmetric key cryptography.
It is designed to use public key for encryption and a private
or secrete key for decryption. Both the public and private
keys are required for the process [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. A person with the
possession of the public key can encrypt the message but
cannot decrypt it. It can only be decrypted by the person with
      </p>
      <p>
        The goal of steganography is to hide information by
making it difficult to observer to detect that information is
present. Steganography is closely related to cryptography
though they differ in terms of operation [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Fig. 4 shows the
overview of the steganography system.

      </p>
      <p>
        Covert object is a name given to the object through
which message is hidden. The image that is obtained through
embedding secret object or image into covert image is
known as stego image [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. The message that is hidden could
be plaintext, image or cipher text.
      </p>
      <p>Steganography system commonly used today are as
follows:
</p>
      <p>Audio Steganography: Unused audio bits are used to
embed a secret message. This is due to the fact that
every file have some area where messages can be
hidden also known as unused bit.</p>
      <p>Image steganography: This is used to hide secret
messages into a carrier image. The resulting image is
called stego image.</p>
      <p>Video Steganography: This involves dividing the
video into image frames and audio, thus the
embedding is performed using the audio file.</p>
      <p>II.</p>
      <p>LITERATURE REVIEW</p>
      <p>
        Many works had been proposed and carried out in the
area of steganography and cryptography. In the research
work of [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], the researchers proposed an efficient data
hiding system based on audio steganography and
cryptography. The performance and efficiency of the system
was evaluated for effectiveness and their results clearly
shows that the application of cryptography and
steganography to the system makes it more secured. They
recommended the system to be used for establishing a secure
communication on the Internet.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] in their research paper entitled “A novel security
scheme for secret data using cryptography and
steganography’’ proposed a security model. The authors
combined Steganography and Cryptography. The
confidential information was encrypted using Advanced
Encryption Standard (AES) algorithm. Their model provided
a two-layer security for secrete data. In addition, the system
provided extraordinary insertion capacity and high class
stego images.
sizes of data hidden were tested on the system. Hence the
system was efficient in hiding data inside an image.
      </p>
      <p>
        In another paper by [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], the authors proposed an
algorithm called Hash Least Significant Bit (H- LSB) with
affine cipher that will provide more security to data in a
networked environment. A number of images with different
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] in their research proposed a steganographic method
based on gray-level modification for true color images.
Image transposition and secret key was used. The system
used bitxor operation, stego key-based encryption and bit
shuffling which were hidden in the host image pixel. Five
security level was utilized The proposed technique was
evaluated using different image assessment metrics which
produced interesting results based on imperceptibility and
security.
      </p>
      <p>A secure and robust method for hiding information is the
main aim of the proposed scheme. To achieve the
requirement for steganography such as security, robustness
and capacity, we considered combining steganography and
cryptography.</p>
      <p>In our proposed method, inserting the information into
image file was achieved using the LSB bit manipulation. The
message is encrypted using RSA algorithm. Image file as
well as text files are converted into their binary equivalent
before embedding. RSA was used to encrypt the information,
the encrypted information is then inserted into the image file
using the LSB algorithm. The extraction of the information
is done at the side at the receiver. This required the hidden
information file to be chosen first. After file selection,
advance LSB is used to remove the scrambled information,
which is then scrambled using RSA.</p>
      <p>The proposed method for the embedding and extraction
of information in image is presented below</p>
    </sec>
    <sec id="sec-3">
      <title>C. The Proposed Algorithm</title>
      <p>LSB coding and RSA algorithm were used for the
proposed algorithm. The text is scrambled using the RSA
algorithm. Based on the system, the secret text is embedded
inside an image. It is then converted into binary equivalent.
To make it more secure, an XOR operation is applied. The
message is scrambled with the help of RSA which is then
inserted into the image file then into binary. The scrambled
message is inserted into the file LSB bit of the separate
block. The name given to the inserted image file is also
called stego image</p>
    </sec>
    <sec id="sec-4">
      <title>D. RSA Algorithm</title>
      <p>RSA are initials for Ron Rivest, Adi Shamir, and
Leonard Adleman. It is an asymmetric cryptosystem which
means two keys are involved for encryption and decryption.
It requires two large prime numbers to be selected after
which the product is used to form a private and public key,
which can be used to perform encryption and decryption of
the information.</p>
      <p>Below are the brief steps involved in RSA Algorithm.</p>
    </sec>
    <sec id="sec-5">
      <title>F. Message Extraction Algorithm</title>
    </sec>
    <sec id="sec-6">
      <title>Step One: Get the stego image</title>
    </sec>
    <sec id="sec-7">
      <title>Step Two: Obtain the LSB &amp; (LSB + 1) embedded message bit of pixel</title>
    </sec>
    <sec id="sec-8">
      <title>Step Three: Use the XOR operation on the LSB &amp; (LSB+1) bits</title>
    </sec>
    <sec id="sec-9">
      <title>Step Four: Obtain an XOR values of the entire pixel values</title>
    </sec>
    <sec id="sec-10">
      <title>Step Five: From the XOR value, retrieve the bits.</title>
    </sec>
    <sec id="sec-11">
      <title>Step six: Decrypt the retrieved data using RSA algorithm</title>
    </sec>
    <sec id="sec-12">
      <title>Step Seven: Secrete message obtained at this stage.</title>
      <p>RESULT</p>
      <p>The actual cover image and the stego image based on the
PSNR and MSE values have been shown together with their
histogram which are also shown in figures.</p>
    </sec>
    <sec id="sec-13">
      <title>E. Advance LSB Algorithm</title>
    </sec>
    <sec id="sec-14">
      <title>The message embedding algorithm:</title>
    </sec>
    <sec id="sec-15">
      <title>Step One: Enter the encrypted message by means of RSA</title>
    </sec>
    <sec id="sec-16">
      <title>Step Two: Choose a cover image</title>
    </sec>
    <sec id="sec-17">
      <title>Step Three: From the cover image take pixels</title>
    </sec>
    <sec id="sec-18">
      <title>Step Four: From the pixels take (LSB+1) bit.</title>
    </sec>
    <sec id="sec-19">
      <title>Step Five: divide encrypted text (two equal parts).</title>
    </sec>
    <sec id="sec-20">
      <title>Step six: Compute the XOR operation for the first portion of</title>
      <p>the encrypted message plus the pixel’s odd position value</p>
    </sec>
    <sec id="sec-21">
      <title>Step seven: Compute XOR operation for the second portion of the encrypted message plus the pixel’s even position value</title>
    </sec>
    <sec id="sec-22">
      <title>Step eight: Obtain the entire xored of both the odd and even position pixel.</title>
    </sec>
    <sec id="sec-23">
      <title>Step Nine: From the even position of the LSB bit pixel, save the xored value of the even.</title>
      <p>CONCLUSION</p>
      <p>Image steganography based on advanced LSB technique
has been proposed and accomplished. The system which is
achieved using advance LSB technique has the ability embed
secret messages into cover images with no generation of any
serious change. In this work, a novel method for concealing
message within an image with fewer alteration in the bits of
the image have been developed. This makes the technique
safer and more robust than considering only LSB. The use of
cryptographic technique which is the RSA algorithm helps in
securing the secret information by making it difficult to
understand the message without the key. This is due to the
fact that RSA algorithm is a secure algorithm. The use of
XOR operation in addition to the RSA algorithm makes the
method more reliable especially when it sending information
in an unsecured channel is needed.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Oluwakemi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Kayode</surname>
          </string-name>
          , and
          <string-name>
            <given-names>O. J.</given-names>
            <surname>Ayotunde</surname>
          </string-name>
          , “
          <article-title>Efficient data hiding system using cryptography and steganography”</article-title>
          ,
          <source>International Journal of Applied Information Systems IJAIS411</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>6</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Chadha</surname>
          </string-name>
          , Mallik,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Chadha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Johar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            , and
            <surname>M. M. Roja</surname>
          </string-name>
          , “
          <article-title>Dual-Layer Video Encryption using RSA Algorithm</article-title>
          .”
          <source>arXiv preprint arXiv:1509.04387</source>
          .
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>K. S.</given-names>
            <surname>Dipti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Neha</surname>
          </string-name>
          , “
          <article-title>Proposed system for data hiding using cryptography and steganography”</article-title>
          ,
          <source>International journal of computer application</source>
          .
          <source>2010</source>
          . Vol.
          <volume>8</volume>
          , issue 9, pp .
          <fpage>7</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>T.</given-names>
            <surname>Jawahar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Nagesh</surname>
          </string-name>
          , “
          <article-title>DES, AES and blowfish: Symmetric key cryptography algorithms simulation based performance analysis</article-title>
          ,”
          <source>International journal of emerging technology and advance engineering</source>
          , vol.
          <volume>1</volume>
          , issue 2, pp.
          <fpage>6</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Mehndiratta</surname>
          </string-name>
          , ”
          <article-title>Data Hiding System Using Cryptography and Steganography: A Comprehensive Modern Investigation”</article-title>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Tyagi</surname>
          </string-name>
          ,
          <article-title>"Data Hiding in Image using least significant bit with cryptography."</article-title>
          <source>International Journal of Advanced Research in Computer Science and Software Engineering</source>
          <volume>2</volume>
          .4,
          <issue>2012</issue>
          , pp.
          <fpage>120</fpage>
          -
          <lpage>123</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Monika</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Pradeep</surname>
          </string-name>
          , “
          <article-title>A comparative survey on symmetric key encryption techniques”</article-title>
          ,
          <source>International journal on computer science</source>
          and engineering,”
          <year>2012</year>
          , vol.
          <volume>4</volume>
          , issue 5, pp.
          <fpage>877</fpage>
          -
          <lpage>882</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Raphael</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Sundaram</surname>
          </string-name>
          , “Cryptography and steganography - A survey,”
          <source>International journal of computer technology application</source>
          ,
          <year>2011</year>
          , vol.
          <volume>2</volume>
          , issue 3, pp.
          <fpage>626</fpage>
          -
          <lpage>630</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Mamta</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Parvinder</surname>
          </string-name>
          , “
          <article-title>An improved LSB based steganography technique for RGB color images</article-title>
          ,”
          <source>International journal of computer and communication engineering</source>
          , vol.
          <volume>2</volume>
          issue
          <issue>4</issue>
          , pp.
          <fpage>513</fpage>
          -
          <lpage>51</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Laskar</surname>
          </string-name>
          , and
          <string-name>
            <surname>Hemachandran</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>“High Capacity data hiding using LSB Steganography and Encryption”</article-title>
          ,
          <source>International Journal of Database Management Systems</source>
          , vol.
          <volume>4</volume>
          (
          <issue>6</issue>
          ),
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Phad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. S.</given-names>
            <surname>Bhosale</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Panhalkar</surname>
          </string-name>
          , “
          <article-title>A novel security scheme for secrete data using cryptography and steganography”</article-title>
          .
          <source>International Journal on Computer Network and Information Security</source>
          , vol.
          <volume>2</volume>
          , issue 6. pp
          <fpage>36</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Muhammad</surname>
          </string-name>
          , Abdullah, and R. H. HamaAziz, “
          <article-title>New Approach to encrypt and decrypt data in image using cryptography and steganography Algorithm”</article-title>
          ,
          <year>2016</year>
          , vol.
          <volume>143</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>11</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Muhammad</surname>
          </string-name>
          , Ahmad,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Sajjad</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and M.</given-names>
            <surname>Zubair</surname>
          </string-name>
          , “
          <article-title>Secure image steganography using cryptography and image transposition”</article-title>
          .
          <source>arXiv preprint arXiv:1510</source>
          .
          <fpage>04413</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>