Loading

Robust and Secured Image Steganography using Improved LSB and RC4 Cryptography with Preprocessing Operation
Zahraa K. Taha1, Mohammed Naser Alturfi2, Baraa M. Albaker3, Y. W. Abduljalel4, H. A. Jasim5, I. Majeed6, A. J.Askir7, A. A. Mhawish8, R. R. Saady9, M. A. Ahmed10, A. S. Ali, M. G.Abbas11

1Zahraa K. Taha, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
2Mohammed Naser Alturfi, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
3Baraa M. Albaker, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
4Y. W. Abduljalel, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
5H. A. Jasim, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
6I. Majeed, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
7A. J.Askir, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
8A. A. Mhawish, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
9R. R. Saady, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
10M. A. Ahmed, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
11A. S. Ali College of Engineering, Al-Iraqia University, Baghdad, Iraq. M. G.Abbas, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
Manuscript received on 20 October 2019 | Revised Manuscript received on 26 October 2019 | Manuscript Published on 02 November 2019 | PP: 1049-1052 | Volume-8 Issue-2S9 September 2019 | Retrieval Number: B10940982S919/2019©BEIESP | DOI: 10.35940/ijrte.B1094.0982S919
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The security of the transmitted data over the internet has become one of the challenges sharing with data communication over computer network. In this paper, a new stegnography system is developed using Improved Least Significant Bit (ILSB) with preprocessing operation for concealing data. The system mixes several technological rules to enhance the performance of concealing scheme. The original secret image is divided into several segments then rearranged to even and odd. Rivest Cipher 4 (RC4) algorithm is applied on preprocessed image before concealing it on the cover image using ILSB. The proposed systems are simulated using MATLAB software package. The experimental results show that our suggested method successes of concealing data according to PSNR ratio, correlation and elapsed time. Preprocessing operation provides flexibility and robustness to the overall system. Improved LSB is simple and strong method for concealing images. Finally, the proposed system is very active to hide the gray scale image inside the color image.
Keywords: Image Steganography; Cryptography; RC4 Algorithm; Concealing Data; Security of Data Transmission.
Scope of the Article: Image Security