Compression Multi-Level Crypto Stego Security of Texts Utilizing Colored Email Forwarding

Encrypted messages will draw the attention of third parties, leading attempts to break the original messages and disclose it. Obscuring facts and communications can be achieved by concealing the message using a technique called steganography, which hides the presence of messages and secrets from the public. Several digital mediums, such as texts, images, audio and video, can be used as cover media for digital steganography, with text steganography being our focus in this research. Utilizing text as a target medium is complex due to the lack of available redundant data-bits within text file. Steganography can be used together with cryptography to offer higher level of privacy and security over the communication channel. This paper presents a multi-level security method that takes the sensitive text and compresses it through the LZW compression algorithm and then encrypts it using the Advanced Encryption Standard (AES) algorithm in order to be stego-hidden in forward email colored platform. Implementation results show that this proposed multi-level scheme is giving motivating security, highcapacity, and practical performance text crypto stego interesting technique showing attractive contribution.

[1]  Farhan Khan,et al.  Message Concealment Techniques using Image based Steganography , 2007 .

[2]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[3]  S. Arabia,et al.  Implementation of a pipelined modular multiplier architecture for GF(p) elliptic curve cryptography computation , 2011 .

[4]  Nouf A. Al-Otaibi,et al.  2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers , 2014 .

[5]  Adnan Abdul-Aziz Gutub,et al.  A Novel Arabic Text Steganography Method Using Letter Points and Extensions , 2007 .

[6]  A. A-A Gutub,et al.  Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[7]  Basem Y. Alkazemi,et al.  LIGHT-WEIGHT CRYPTOGRAPHY TO SECURE MEDICAL DATA IN IOT , 2017 .

[8]  Adnan Abdul-Aziz Gutub,et al.  Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers , 2006, Int. Arab J. Inf. Technol..

[9]  Salah A. Aly,et al.  INTELLIGENT RECOGNITION SYSTEM FOR IDENTIFYING ITEMS AND PILGRIMS , 2018 .

[10]  A. Gutub,et al.  SERIAL VS. PARALLEL ELLIPTIC CURVE CRYPTO PROCESSOR DESIGNS , 2013 .

[11]  Arambam James Singh,et al.  Understanding Steganography over Cryptography and Various Steganography Techniques , 2015 .

[12]  Adnan Abdul-Aziz Gutub,et al.  Counting-based secret sharing technique for multimedia applications , 2019, Multimedia Tools and Applications.

[13]  M. Shirali-Shahreza,et al.  Steganography in TeX documents , 2008, 2008 3rd International Conference on Intelligent System and Knowledge Engineering.

[14]  Adnan Abdul-Aziz Gutub,et al.  Multi-Bits Stego-System For Hiding Text in Multimedia Images Based on User Security Priority , 2018 .

[15]  M. Shirali-Shahreza,et al.  Text Steganography in SMS , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[16]  Shahir Akram Hassan,et al.  Integrity verification for digital Holy Quran verses using cryptographic hash function and compression , 2020, J. King Saud Univ. Comput. Inf. Sci..

[17]  Khan Farhan Rafat Enhanced text steganography in SMS , 2009, 2009 2nd International Conference on Computer, Control and Communication.

[18]  Adnan Abdul-Aziz Gutub,et al.  Subthreshold SRAM Designs for Cryptography Security Computations , 2011, ICSECS.

[19]  Adnan Abdul-Aziz Gutub,et al.  Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography , 2018 .

[20]  Adnan Abdul-Aziz Gutub,et al.  Efficient Adders to Speedup Modular Multiplication for Cryptography , 2008 .

[21]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[22]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[23]  Harsh K. Verma,et al.  A high capacity text steganography scheme based on LZW compression and color coding , 2017 .