A New Steganography Technique Using Magic Square Matrix And Affine Cipher

Authors

  • Waleed S. Hasan Al-Hasan Faculty of Electrical Engineering, Universiti Teknologi Malaysia, 81310 Johor, Malaysia.
  • Muhammad Mun’im Ahmad Zabidi Faculty of Electrical Engineering, Universiti Teknologi Malaysia, 81310 Johor, Malaysia.
  • Ab Al-Hadi Ab Rahman Faculty of Electrical Engineering, Universiti Teknologi Malaysia, 81310 Johor, Malaysia.

Keywords:

Steganography, Stego-image, ISB, Magic Square, Affine Cipher,

Abstract

The need for methods to provide effective protection of data has become necessary due to the huge growth of multimedia applications on networks. Steganography is one of the most widespread approaches to protecting data. The challenge of steganographic methods is to create a rational balance between the quality of the file and the size of data that can be transferred. In addition, the robustness of the technique and security of the obscure data are key factors in determining the effectiveness of the algorithm. In this paper, a new steganography approach is proposed to fulfill the requirements of steganography which are imperceptibility, payload, and robustness. First, the cover image is converted from RGB color space to YCbCr color space. Then, Cb or Cr channel is selected to hide the secret data. The secret data is encrypted using Affine Cipher to increase its security. The Magic Square Matrix is applied to embed the secret code onto the Cb or Cr component using ISB (Intermediates Significant Bits) approach. Finally, the cover image is evaluated after applying the salt-and-pepper noise. The results show that the new proposed method not only improves the security of the payload but can also withstand against attacks.

Downloads

Published

2018-07-05

How to Cite

Al-Hasan, W. S. H., Ahmad Zabidi, M. M., & Ab Rahman, A. A.-H. (2018). A New Steganography Technique Using Magic Square Matrix And Affine Cipher. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(2-8), 119–124. Retrieved from https://jtec.utem.edu.my/jtec/article/view/4472