Volume 16, Issue 4 (12-2024)                   itrc 2024, 16(4): 1-8 | Back to browse issues page

XML Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Biglou R, Mirzaei M, Hajipour P. Joint Use of RSA and Genetic Algorithm to Improve the Process of Image Encryption and Information Hiding. itrc 2024; 16 (4) :1-8
URL: http://journal.itrc.ac.ir/article-1-611-en.html
1- Department of Business Management Faculty of Management and Accounting College of Farabi University of Tehran Tehran, Iran
2- Department of Electrical Engineering Islamic Azad University North Tehran Branch Tehran, Iran , mohammad.mirzaei@iau.ac.ir
3- Instructor of Satellite Communication Group Faculty of Communications Technology, ICT Research Institute, Tehran, Iran,
Abstract:   (293 Views)
In this paper, the combined use of cryptography and information hiding in the image is discussed. First, the RSA method is used to perform encryption information. Secondly, steganography for the encrypted information has been used by genetic evolutionary algorithm (GA). Also, the evolutionary GA is used to find the best bit string length in order to maximize the peak signal-to-noise ratio (PSNR). A graphical user interface (GUI) has been provided to apply the proposed method to sentences of different lengths in four different images to obtain the mean squared error (MSE) and PSNR benchmarks relative to changing the image size and compression rate on the receiving side. In the proposed algorithm, the encryption sentences have been applied 10 times on the data by the proposed algorithm to improve the key strength. The simulation results showed higher efficiency of about 28.57 percent better than normal AES, 15 percent better than DSA, 18.01 percent better than ECC and about 7.76 percent better than RSA.
Full-Text [PDF 985 kb]   (112 Downloads)    
Type of Study: Research | Subject: Communication Technology

References
1. V.K Sharma, P.Mathur, DK.Srivastava, “Highly secure DWT steganography scheme for encrypted data hiding, ” Information and Communication Technology for Intelligent Systems,vol.1, pp. 665-673, 2019.
2. A.Gupta, S.Gupta, and N.Yadav, “Enhancement of security using B-RSA algorithm, ” Inventive Communication and Computational Technologies, pp.439-450, 2020.‏
3. M.Aghababaei and S. Jafarpourneshli, “Color Image Encryption Based on DNA Algorithm, ” 5th National Conference on Electrical and Mechatronic Engineering of Iran, Tehran, https://civilica.com/doc/988464,pp.1-20, 1398.
4. M.Rajaei and S.Zeidabadi Nejad, “Cryptography Using RSA Algorithm and the Remaining Chinese Theorem, ”5th National Conference on Electrical and Electronic Engineering of Iran, Gonabad, https://civilica.com/doc/219747, 2013.
5. Y.Pourasad, R.Ranjbarzadeh, A.Mardani, “A new algorithm for digital image encryption based on chaos theory, ” Entropy, vol.23,no.3,pp.1-16, 2021.
6. A.Kaur and G. Singh , “A random selective block encryption technique for secure image cryptography using blowfish algorithm, ” 2th International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 1290-1293, 2018.‏
7. M.J.Saddam, A.I. Abdullahi and A.Hamid Mohammed, “A Lightweight Image Encryption And Blowfish Decryption For The Secure Internet Of Things, ” 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT),pp.1-5, 2020.‏
8. F.H. Mohammed Sediq Al-Kadei, H. Abdalkaream Mardan and N. A. Minas, “Speed Up Image Encryption by Using RSA Algorithm, ” 6th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1302-1307, 2020.‏
9. Y.Liu,Z.Jiang,X.Xu,F.Zhang and J.Xu, “Optical image encryption algorithm based on hyper-chaos and public-key cryptography, ” Optics and Laser Technology, vol.127,no.7,pp.1-10, 2020.
10. Z.Xin, L.Dong, Y.Sheng, L.Da-hai, H.Jian-Ping, “A method for hiding information utilizing double random phase encoding technique, ”Optics and Laser Technology, vol .39,no.7,pp.1360-1363,2007.
11. S.Katzenbeisser, P.Fabien A.P, “Information Hiding Techniques for Steganography and Digital Watermarking, ”Artech House, pp.1-220, 2000.
12. J.Islampanah, S.N.Razavi, “Presenting a New Method for Image Encryption Using Fuzzy System, ” 3th National Congress of New Technologies of Iran with the Aim of Achieving Sustainable Development, Tehran, https://civilica.com/doc/463566, pp.1-19,2015.
13. M.Mitchell, “An introduction to genetic algorithms, ” MIT press,pp.1-209,1998.
14. MA.Ali, EH.Houssein, NA.Eldemerdash, AE, “Hassanien. Increasing the hiding capacity in image steganography using Braille code, ” International Journal of Intelligent Engineering Informatics,vol.5, no.4, pp.327-341, 2017.
15. X.Zhou, JG.Chen, “Information hiding based on double-random phase encoding technology, ” Journal of Modern Optics,vol.53,no.12,pp.1777-1783,2006.
16. K.Mishra, SK.Singh, P.Nagabhushan, “An improved SVD based image compression, ” Conference on Information and Communication Technology (CICT), pp. 1-5, 2018.
17. A.Alkholidi, A.Alfalou, H.Hamam, “ A new approach for optical colored image compression using the JPEG standards, ” Signal Processing, vol.87,no.4,pp.569-583,2007.
18. S.Chandra, S.Paira, S.Safikul Alam and G.Sanyal, “A Comparative Survey of Symmetric and Asymmetric Key Cryptography, ” International Conference on Electronics, Communication and Computational Engineering (ICECCE), pp.83–93,2014.
19. S.Sharifi,M.Esmaeildoust, M. R.Taheri and K.Navi, “Efficient Implementation of RNS Montgomery Multiplication Using Balanced RNS Bases, ” Journal of Mathematics and Computer Science (JMCS), vol.12, pp.51–64,2014

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.