Proceedings of the 1st International Multi-Disciplinary Conference Theme: Sustainable Development and Smart Planning, IMDC-SDSP 2020, Cyperspace, 28-30 June 2020

Research Article

Hide a Secret File in Several BMP Images using the Circular Secret Key

Download401 downloads
  • @INPROCEEDINGS{10.4108/eai.28-6-2020.2298162,
        author={Aamer  SUHAIL},
        title={Hide a Secret File in Several BMP Images using the Circular Secret Key},
        proceedings={Proceedings of the 1st International Multi-Disciplinary Conference Theme: Sustainable Development and Smart Planning, IMDC-SDSP 2020, Cyperspace, 28-30 June 2020},
        publisher={EAI},
        proceedings_a={IMDC-SDSP},
        year={2020},
        month={9},
        keywords={steganography encryption circular secret key cover information hiding least significant bit (lsb)},
        doi={10.4108/eai.28-6-2020.2298162}
    }
    
  • Aamer SUHAIL
    Year: 2020
    Hide a Secret File in Several BMP Images using the Circular Secret Key
    IMDC-SDSP
    EAI
    DOI: 10.4108/eai.28-6-2020.2298162
Aamer SUHAIL1,*
  • 1: Ninaveh Technical Institute, Northern Technical University, Mosul, Iraq
*Contact email: aamir@ntu.edu.iq

Abstract

Digital data hiding technique is very important in achieving important and sensitive data security, especially those are transmitted through various digital communication channels, it differs from encryption technique, by unperceived or perceived by hackers, as it is based on the principle of hiding those Data within other digital media as their carrier covers. With the development of these hiding techniques, another technique developed to decipher the content of these data, to increase the efficiency of hiding methods of steganography and cryptography techniques should be merged. In this research the distribution of data to be hidden on a set of digital images of the type of BMP was adopted in a random way based on a circular secret key that created randomly and at an agreed length between the sender and the receiver, therefore this method eliminates the suspicion of any confidential content, as well as complicates the data retrieved process.