Enhancing Steganography with Blockchain: A Novel Approach for Secure Text Hiding in Encrypted Images

Maalim A. Aljabery

Abstract


Steganography is a technique used to hide data within other data, emerging from the realization that information is valuable and must be concealed. By considering the potential of blockchain technology, which produces and stores data in an immutable chain, it is clear that steganography can be effectively applied alongside blockchain to hide information. This approach eliminates the need for traditional hiding methods.  In this study, we aim to hide text messages within encrypted images using a new steganography-based blockchain, making them appear as ordinary encrypted images. The AES algorithm in CBC mode was used to encrypt both images and texts.  Each image was split into 32-byte blocks, with a special block allocated for text, allowing for a text size of 32 characters. The robustness of the proposed technique against differential attacks was assessed using unified averaged changed intensity (UACI), number of pixels change rate (NPCR), entropy analysis, and correlation analysis. The outcomes show that the proposed encryption method generates random images and secure texts that are resistant of differential attacks as well as offer the high-level security.

Full Text:

PDF

References


A. Sabir, H. A. Ali, and M. A. Aljabery, “ChatGPT Tweets Sentiment Analysis Using Machine Learning and Data Classification,” Inform., vol. 48, no. 7, pp. 103–112, 2024, doi: 10.31449/inf.v48i7.5535.

M. Takaoğlu, A. Özyavaş, N. Ajlouni, A. Alshahrani, and B. Alkasasbeh, “A novel and robust hybrid blockchain and steganography scheme,” Appl. Sci., vol. 11, no. 22, 2021, doi: 10.3390/app112210698.

A. Jan, S. A. Parah, M. Hussan, and B. A. Malik, “Double layer security using crypto-stego techniques: a comprehensive review,” Health Technol. (Berl)., vol. 12, no. 1, pp. 9–31, 2022, doi: 10.1007/s12553-021-00602-1.

A. H. Mohsin et al., “PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture,” Multimed. Tools Appl., vol. 80, no. 9, pp. 14137–14161, 2021, doi: 10.1007/s11042-020-10284-y.

P. W. Khan and Y. Byun, “A blockchain-based secure image encryption scheme for the industrial internet of things,” Entropy, vol. 22, no. 2, 2020, doi: 10.3390/e22020175.

A. K. Bermani, T. A. K. Murshedi, and Z. A. Abod, “A hybrid cryptography technique for data storage on cloud computing,” J. Discret. Math. Sci. Cryptogr., vol. 24, no. 6, pp. 1613–1624, 2021, doi: 10.1080/09720529.2020.1859799.

K. Koptyra and M. R. Ogiela, “Imagechain—application of blockchain technology for images,” Sensors (Switzerland), vol. 21, no. 1, pp. 1–12, 2021, doi: 10.3390/s21010082.

M. N. M. Bhutta et al., “A Survey on Blockchain Technology: Evolution, Architecture and Security,” IEEE Access, vol. 9, pp. 61048–61073, 2021, doi: 10.1109/ACCESS.2021.3072849.

M. Y. Jabarulla and H. N. Lee, “Blockchain-based distributed patient-centric image management system,” Appl. Sci., vol. 11, no. 1, pp. 1–20, 2021, doi: 10.3390/app11010196.

P. Ms.Jahanvi, Navtej, Medini H, Mamisha, “Blockchain Technology Based Image Steganography,” Int. J. Creat. Res. Thoughts, vol. 11, no. May, pp. 82–87, 2023.

D. Brabin, C. Ananth, and S. Bojjagani, “Blockchain based security framework for sharing digital images using reversible data hiding and encryption,” Multimed. Tools Appl., vol. 81, no. 17, pp.

–24738, 2022, doi: 10.1007/s11042-022-12617-5.

A. Roshanzamir, V. Weerakkody, N. Rana, M. Rahmati, and M. Shajari, “Blockchain and Image Processing to Reinforce Provenance in the Narrative of a Handwoven Carpet,” Int. J. Adv. Internet Technol., vol. 12, no. 3, pp. 61–75, 2019, [Online]. Available: http://www.iariajournals.org/internet_technology/

J. H. Horng, C. C. Chang, G. L. Li, W. K. Lee, and S. O. Hwang, “Blockchain-Based Reversible Data Hiding for Securing Medical Images,” J. Healthc. Eng., vol. 2021, 2021, doi: 10.1155/2021/9943402.

M. Acharya and R. S. Sharma, “A novel image encryption based on feedback carry shift register and blockchain for secure communication,” Int. J. Appl. Eng. Res., vol. 16, no. 6, pp. 466–477, 2021.

R. Bhaskaran, R. Karuppathal, M. Karthick, J. Vijayalakshmi, S. Kadry, and Y. Nam, “Blockchain Enabled Optimal Lightweight Cryptography Based Image Encryption Technique for IIoT,” Intell. Autom. Soft Comput., vol. 33, no. 3, pp. 1593–1606, 2022, doi: 10.32604/iasc.2022.024902.

S. Inam, S. Kanwal, R. Firdous, and F. Hajjej, “Blockchain based medical image encryption using Arnold’s cat map in a cloud environment,” Sci. Rep., vol. 14, no. 1, pp. 1–22, 2024, doi: 10.1038/s41598-024-56364-z.

“secrets — Generate secure random numbers for managing secrets.” https://docs.python.org/3/library/secrets.html (accessed Feb. 17, 2024).

S. Kurnaz and M. A. H. Aljabery, “Predict the type of hearing aid of audiology patients using data mining techniques,” ACM Int. Conf. Proceeding Ser., pp. 2–6, 2018, doi: 10.1145/3234698.3234755.

G. K. Shraida and H. A. Younis, “An Efficient Diffusion Approach for Chaos-Based Image Encryption and DNA Sequences,” Iraqi J. Electr. Electron. Eng., vol. 18, no. 2, pp. 69–74, 2022, doi: 10.37917/ijeee.18.2.9.

Z. Man, J. Li, X. Di, and O. Bai, “An Image Segmentation Encryption Algorithm Based on Hybrid Chaotic System,” IEEE Access, vol. 7, pp. 103047–103058, 2019, doi: 10.1109/ACCESS.2019.2931732.

Z. A. Abduljabbar et al., “Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Map,” IEEE Access, vol. 10, pp. 26257–26270, 2022, doi: 10.1109/ACCESS.2022.3151174.

O. S. Faragallah, H. S. El-sayed, A. Afifi, and W. El-Shafai, “Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform,” Opt. Lasers Eng., vol. 137, no. May 2020, 2021, doi: 10.1016/j.optlaseng.2020.106333.

G. K. Shraida, H. A. Younis, T. A. Al-Amiedy, M. Anbar, H. A. Younis, and I. H. Hasbullah, “An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher,” Comput. Mater. Contin., vol. 75, no. 2, pp. 2641–2654, 2023, doi: 10.32604/cmc.2023.035793.




DOI: https://doi.org/10.31449/inf.v48i21.6689

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.