Skip to main content
Log in

Customized model for text cryptography using hybrid image-key

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

A Correction to this article was published on 08 June 2024

This article has been updated

Abstract

Traditional encryption models are vulnerable because shared keys used for message decryption may be compromised by intercepted transmissions. Attackers can now create scripts thanks to the development of sophisticated technologies, which poses a significant security risk. This study offers a methodology to improve the security of text data during transmission in order to address these issues. It does this by addressing common flaws in current encryption procedures and presenting an even more robust framework. The research aims to improve security measures as a result of the rising risks linked to text data in networks. The study uses a compact, image-based hybrid key and an innovative methodology that integrates several open-source techniques, drawing on well-established steganography research. Through the use of a sophisticated encryption and decryption mechanism, this all-inclusive strategy seeks to improve data protection while aiming for the best performance possible in accordance with industry norms and standards.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

Data associated with this work can be availed from the corresponding author upon formal request.

Change history

References

  1. Almuhammadi, S., Al-Shaaby, A.: A survey on recent approaches combining cryptography and steganography 63–74 (2017). https://doi.org/10.5121/csit.2017.70306.

  2. Radanliev, P., De Roure, D., Cannady, S., Montalvo, R. M., Nicolescu, R., Huth, M.: Economic impact of IoT cyber risk—Analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance. IET Conf. Publ., CP740, 2019 (2018). https://doi.org/10.1049/cp.2018.0003.

  3. Alanizy, N., Alanizy, A., Baghoza, N., Alghamdi, M., Gutub, A.: 3-Layer PC text security via combining compression, AES cryptography 2LSB image steganography. J. Res. Eng. Appl. Sci. 3(04), 118–124 (2018)

    Google Scholar 

  4. Gutub, A. A., Fattani, M. M.: A novel Arabic text steganography method using letter points and extensions. Eng. Technol. 28–31 (2007).

  5. Alifah Roslan, N., Izura Udzir, N., Mahmod, R., Gutub, A.: Systematic literature review and analysis for Arabic text steganography method practically, Egypt. Inf. J. 23(4), 177–191 (2022). https://doi.org/10.1016/j.eij.2022.10.003

    Article  Google Scholar 

  6. Alkhudaydi, M., Gutub, A.: Securing data via cryptography and Arabic text steganography. SN Comput. Sci. 2(1), 1–18 (2021). https://doi.org/10.1007/s42979-020-00438-y

    Article  Google Scholar 

  7. Alanazi, N., Khan, E., Gutub, A.: Involving spaces of Unicode standard within irreversible Arabic text steganography for practical implementations. Arab. J. Sci. Eng. 46(9), 8869–8885 (2021). https://doi.org/10.1007/s13369-021-05605-8

    Article  Google Scholar 

  8. Alanazi, N., Khan, E., Gutub, A.: Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multimed. Tools Appl. 80(1), 1403–1431 (2021). https://doi.org/10.1007/s11042-020-09667-y

    Article  Google Scholar 

  9. Alanazi, N., Khan, E., Gutub, A.: Functionality-improved Arabic text steganography based on Unicode features. Arab. J. Sci. Eng. 45(12), 11037–11050 (2020). https://doi.org/10.1007/s13369-020-04917-5

    Article  Google Scholar 

  10. Alkhudaydi, M.G., Gutub, A.A.: Integrating Light-weight cryptography with diacritics Arabic text steganography improved for practical security applications. J. Inf. Secur. Cybercrimes Res. 3(1), 13–30 (2020)

    Article  Google Scholar 

  11. Al-Nofaie, S.M.A., Gutub, A.A.A.: Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications. Multimed. Tools Appl. 79(1–2), 19–67 (2020). https://doi.org/10.1007/s11042-019-08025-x

    Article  Google Scholar 

  12. Jan, M. A., Ahmad, B.: Extension of tinny application for cloud based custom software with encryption queue: A strategy to protect data on cloud. Innov. Syst. Des. Eng. 2(3) (2012).

  13. Thabit, R., Udzir, N.I., Yasin, S.M., Asmawi, A., Gutub, A.A.A.: CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data. IEEE Access 10, 65439–65458 (2022). https://doi.org/10.1109/ACCESS.2022.3182712

    Article  Google Scholar 

  14. Gutub, A., Almehmadi, E.: Arabic text watermarking tuned for medical e-record semi-authentication. J. Eng. Res. (2022). https://doi.org/10.36909/jer.18943.

  15. Almehmadi, E., Gutub, A.: Novel Arabic e-Text watermarking supporting partial dishonesty based on counting-based secret sharing. Arab. J. Sci. Eng. 47(2), 2585–2609 (2022). https://doi.org/10.1007/s13369-021-06200-7

    Article  Google Scholar 

  16. Gutub, A., Almehmadi, E.: Advancing partial verification of watermarking for Arabic text via utilization of innovative counting-based secret sharing. Arab. J. Sci. Eng. 48(8), 9963–9989 (2023). https://doi.org/10.1007/s13369-022-07387-z

    Article  Google Scholar 

  17. Gutub, A.A.A., Al-Haidari, F., Al-Kahsah, K.M., Hamodi, J.: E-text watermarking: Utilizing ‘Kashida’ extensions in Arabic language electronic writing. J. Emerg. Technol. Web Intell. 2(1), 48–55 (2010). https://doi.org/10.4304/jetwi.2.1.48-55

    Article  Google Scholar 

  18. Gutub, A.: Emerging Arabic text watermarking utilizing combinations of different diacritics. Arab. J. Sci. Eng. (2024). https://doi.org/10.1007/s13369-023-08629-4

    Article  Google Scholar 

  19. Blessing, J., Specter, M. A., Weitzner, D. J.: You Really Shouldn’t Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries (2021).. Available: http://arxiv.org/abs/2107.04940.

  20. Jager, T., Schwenk, J., Somorovsky, J.: On the security of TLS 1.3 and QUIC against weaknesses in PKCS#1 v1.5 encryption. Proc. ACM Conf. Comput. Commun. Secur. 2015-Octob 1185–1196 (2015). https://doi.org/10.1145/2810103.2813657.

  21. Bhargavan, K., Fournet, C., Kohlweiss, M., Pironti, A., Strub, P. Y.: Implementing TLS with verified cryptographic security. Proc.—IEEE Symp. Secur. Priv. 445–459 (2013). https://doi.org/10.1109/SP.2013.37.

  22. https://www.kaggle.com/datasets/uciml/sms-spam-collection-dataset.

  23. Gurunath, R., Samanta, D.: A new 3-bit hiding covert channel algorithm for public data and medical data security using format-based text steganography. J. Database Manag. 34(2), 1–22 (2023). https://doi.org/10.4018/jdm.324076

    Article  Google Scholar 

  24. Dulera, S., Jinwala, D., Dasgupta, A.: Experimenting with the novel approaches in text steganography. Int. J. Netw. Secur. Its Appl. 3(6), 213–225 (2012). https://doi.org/10.5121/ijnsa.2011.3616

    Article  Google Scholar 

  25. Kamaruddin, N.S., Kamsin, A., Por, L.Y., Rahman, H.: A review of text watermarking: Theory, methods, and applications. IEEE Access 6, 8011–8028 (2018). https://doi.org/10.1109/ACCESS.2018.2796585

    Article  Google Scholar 

Download references

Funding

N/A.

Author information

Authors and Affiliations

Authors

Contributions

The authors confirm contribution to the paper as follows: study conception anda design: Yahya Khan, Muhammad Zubair Asghar; data collection: Yahya Khan; analysis and interpretation of results: Yahya Khan, Shakeel Ahmad; draft manuscript preparation and Revision: Shakeel Ahmad, Muhammad Zubair Asghar. All authors reviewed the results and approved the final version of the manuscript

Corresponding author

Correspondence to Muhammad Zubair Asghar.

Ethics declarations

Conflict of interest

All authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants performed by any of the authors and does not contain any studies with animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, Y., Ahmad, S. & Asghar, M.Z. Customized model for text cryptography using hybrid image-key. SIViP (2024). https://doi.org/10.1007/s11760-024-03208-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11760-024-03208-y

Keywords

Navigation