Abstract
Traditional encryption models are vulnerable because shared keys used for message decryption may be compromised by intercepted transmissions. Attackers can now create scripts thanks to the development of sophisticated technologies, which poses a significant security risk. This study offers a methodology to improve the security of text data during transmission in order to address these issues. It does this by addressing common flaws in current encryption procedures and presenting an even more robust framework. The research aims to improve security measures as a result of the rising risks linked to text data in networks. The study uses a compact, image-based hybrid key and an innovative methodology that integrates several open-source techniques, drawing on well-established steganography research. Through the use of a sophisticated encryption and decryption mechanism, this all-inclusive strategy seeks to improve data protection while aiming for the best performance possible in accordance with industry norms and standards.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11760-024-03208-y/MediaObjects/11760_2024_3208_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11760-024-03208-y/MediaObjects/11760_2024_3208_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11760-024-03208-y/MediaObjects/11760_2024_3208_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11760-024-03208-y/MediaObjects/11760_2024_3208_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11760-024-03208-y/MediaObjects/11760_2024_3208_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11760-024-03208-y/MediaObjects/11760_2024_3208_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11760-024-03208-y/MediaObjects/11760_2024_3208_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11760-024-03208-y/MediaObjects/11760_2024_3208_Fig8_HTML.png)
Similar content being viewed by others
Data availability
Data associated with this work can be availed from the corresponding author upon formal request.
Change history
08 June 2024
A Correction to this paper has been published: https://doi.org/10.1007/s11760-024-03314-x
References
Almuhammadi, S., Al-Shaaby, A.: A survey on recent approaches combining cryptography and steganography 63–74 (2017). https://doi.org/10.5121/csit.2017.70306.
Radanliev, P., De Roure, D., Cannady, S., Montalvo, R. M., Nicolescu, R., Huth, M.: Economic impact of IoT cyber risk—Analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance. IET Conf. Publ., CP740, 2019 (2018). https://doi.org/10.1049/cp.2018.0003.
Alanizy, N., Alanizy, A., Baghoza, N., Alghamdi, M., Gutub, A.: 3-Layer PC text security via combining compression, AES cryptography 2LSB image steganography. J. Res. Eng. Appl. Sci. 3(04), 118–124 (2018)
Gutub, A. A., Fattani, M. M.: A novel Arabic text steganography method using letter points and extensions. Eng. Technol. 28–31 (2007).
Alifah Roslan, N., Izura Udzir, N., Mahmod, R., Gutub, A.: Systematic literature review and analysis for Arabic text steganography method practically, Egypt. Inf. J. 23(4), 177–191 (2022). https://doi.org/10.1016/j.eij.2022.10.003
Alkhudaydi, M., Gutub, A.: Securing data via cryptography and Arabic text steganography. SN Comput. Sci. 2(1), 1–18 (2021). https://doi.org/10.1007/s42979-020-00438-y
Alanazi, N., Khan, E., Gutub, A.: Involving spaces of Unicode standard within irreversible Arabic text steganography for practical implementations. Arab. J. Sci. Eng. 46(9), 8869–8885 (2021). https://doi.org/10.1007/s13369-021-05605-8
Alanazi, N., Khan, E., Gutub, A.: Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multimed. Tools Appl. 80(1), 1403–1431 (2021). https://doi.org/10.1007/s11042-020-09667-y
Alanazi, N., Khan, E., Gutub, A.: Functionality-improved Arabic text steganography based on Unicode features. Arab. J. Sci. Eng. 45(12), 11037–11050 (2020). https://doi.org/10.1007/s13369-020-04917-5
Alkhudaydi, M.G., Gutub, A.A.: Integrating Light-weight cryptography with diacritics Arabic text steganography improved for practical security applications. J. Inf. Secur. Cybercrimes Res. 3(1), 13–30 (2020)
Al-Nofaie, S.M.A., Gutub, A.A.A.: Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications. Multimed. Tools Appl. 79(1–2), 19–67 (2020). https://doi.org/10.1007/s11042-019-08025-x
Jan, M. A., Ahmad, B.: Extension of tinny application for cloud based custom software with encryption queue: A strategy to protect data on cloud. Innov. Syst. Des. Eng. 2(3) (2012).
Thabit, R., Udzir, N.I., Yasin, S.M., Asmawi, A., Gutub, A.A.A.: CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data. IEEE Access 10, 65439–65458 (2022). https://doi.org/10.1109/ACCESS.2022.3182712
Gutub, A., Almehmadi, E.: Arabic text watermarking tuned for medical e-record semi-authentication. J. Eng. Res. (2022). https://doi.org/10.36909/jer.18943.
Almehmadi, E., Gutub, A.: Novel Arabic e-Text watermarking supporting partial dishonesty based on counting-based secret sharing. Arab. J. Sci. Eng. 47(2), 2585–2609 (2022). https://doi.org/10.1007/s13369-021-06200-7
Gutub, A., Almehmadi, E.: Advancing partial verification of watermarking for Arabic text via utilization of innovative counting-based secret sharing. Arab. J. Sci. Eng. 48(8), 9963–9989 (2023). https://doi.org/10.1007/s13369-022-07387-z
Gutub, A.A.A., Al-Haidari, F., Al-Kahsah, K.M., Hamodi, J.: E-text watermarking: Utilizing ‘Kashida’ extensions in Arabic language electronic writing. J. Emerg. Technol. Web Intell. 2(1), 48–55 (2010). https://doi.org/10.4304/jetwi.2.1.48-55
Gutub, A.: Emerging Arabic text watermarking utilizing combinations of different diacritics. Arab. J. Sci. Eng. (2024). https://doi.org/10.1007/s13369-023-08629-4
Blessing, J., Specter, M. A., Weitzner, D. J.: You Really Shouldn’t Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries (2021).. Available: http://arxiv.org/abs/2107.04940.
Jager, T., Schwenk, J., Somorovsky, J.: On the security of TLS 1.3 and QUIC against weaknesses in PKCS#1 v1.5 encryption. Proc. ACM Conf. Comput. Commun. Secur. 2015-Octob 1185–1196 (2015). https://doi.org/10.1145/2810103.2813657.
Bhargavan, K., Fournet, C., Kohlweiss, M., Pironti, A., Strub, P. Y.: Implementing TLS with verified cryptographic security. Proc.—IEEE Symp. Secur. Priv. 445–459 (2013). https://doi.org/10.1109/SP.2013.37.
https://www.kaggle.com/datasets/uciml/sms-spam-collection-dataset.
Gurunath, R., Samanta, D.: A new 3-bit hiding covert channel algorithm for public data and medical data security using format-based text steganography. J. Database Manag. 34(2), 1–22 (2023). https://doi.org/10.4018/jdm.324076
Dulera, S., Jinwala, D., Dasgupta, A.: Experimenting with the novel approaches in text steganography. Int. J. Netw. Secur. Its Appl. 3(6), 213–225 (2012). https://doi.org/10.5121/ijnsa.2011.3616
Kamaruddin, N.S., Kamsin, A., Por, L.Y., Rahman, H.: A review of text watermarking: Theory, methods, and applications. IEEE Access 6, 8011–8028 (2018). https://doi.org/10.1109/ACCESS.2018.2796585
Funding
N/A.
Author information
Authors and Affiliations
Contributions
The authors confirm contribution to the paper as follows: study conception anda design: Yahya Khan, Muhammad Zubair Asghar; data collection: Yahya Khan; analysis and interpretation of results: Yahya Khan, Shakeel Ahmad; draft manuscript preparation and Revision: Shakeel Ahmad, Muhammad Zubair Asghar. All authors reviewed the results and approved the final version of the manuscript
Corresponding author
Ethics declarations
Conflict of interest
All authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants performed by any of the authors and does not contain any studies with animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Khan, Y., Ahmad, S. & Asghar, M.Z. Customized model for text cryptography using hybrid image-key. SIViP (2024). https://doi.org/10.1007/s11760-024-03208-y
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11760-024-03208-y