المنشورات

المنشورات

A strong algorithm for randomly hiding a secret files inside true color image using large primary secret key
Jun 1, 2025

المجلة Egyptian Informatics Journal

الناشر Nineveh Technical Institute

DOI 10.1016/j.eij.2025.100692

العدد 100692

المجلد 30

Hiding in image files is one of the widespread techniques to achieve information security, as it has proven its efficiency. Because of the hiding technology has become the best way to maintain the confidentiality of private information, the attackers have doubts about any translated media, such as various image files, because the possibility of containing important confidential data, then trying to use different methods and algorithms to extract its containing. Therefore, the traditional methods of regular and sequential hiding have become at a steady pace within the media, weak and easy to detect by the attackers, so the trend was to find a new algorithm that adopts the method of random hiding scattered within those media. During the research, a method was developed to hide secret files inside true color images, by distributing the content of it within the image elements in a way that makes the distance between the locations of the image elements in irregular and not fixed space, based on an algorithm random distribution depend on a large prim secret key that agreed upon paging coefficient among the authorized persons, which makes it difficult to extract the hiding locations of those parts within them using image analysis methods, or through statistical analyzes that used in this field. This method succeeded in hiding the secret files without causing a state of distortion to the original image, or the possibility of noticing the changes that occurred in it as a result of the hiding process, and these files were easily retrieved without losing any of their components, in addition to the fact that this extracting process takes place without require the original cover image or need to create a table of shows hiding locations. © 2025

Read Publication

Honey Encryption Security Techniques: A Review Paper
Jun 17, 2022

المجلة مجلة الرافدين لعلوم الحاسوب و الرياضيات

الناشر كلية علوم الحاسوب والرياضيات

DOI https://doi.org/10.33899/csmj.2022.174390

العدد 1

المجلد 16

From time to time, we hear in the news about a breach or attack on some well-known companies as just news, but it is a serious problem because it is the privacy of citizens, their money in trade and managing their businesses and projects. In this paper, we offer a review of the honey encryption planner. Honey Encryption is the encryption system that ensures flexibility versus the brute-force attack through the provision of plain reasonable text, but false for each key is invalid utilized by a trespasser to decrypt a message, two key areas are open it is difficult to create a compelling message trap that's perfect enough to deceive the striker even when he believes that he has the message in its original form. The next problem, the typo issue, where a valid phony plain text seem to a lawful user when he accidentally enters the wrong key. Our goal is to have more satisfaction disguised tricks that are perfect enough to prevent a trespasser from getting the original message, We also need new security methods because the attackers are looking for new ways to attack the systems, so we proposed a new way to protect messages and passwords well and difficult to break and take all the possibilities of attack, including the brute-force, and then the data is hidden in an image with a public secret key.

Read Publication