Enhanced Data Security of Communication System Using Combined Encryption and Steganography

—Data security has become a paramount necessity and more obligation in daily life. Most of our systems can be hacked, and it causes very high risks to our confidential files inside the systems. Therefore, for various secu rity reasons, we use various methods to save as much as possible on this data, regardless of its different forms, texts, pictures, videos, etc. In this paper, we mainly rely on storing the basic image which should be protected in another image after changing its formal to composites using the DWT wavelet transform. The process of zeroing sites and storing their contents technique is used to carry the components of the main image. Then process them mathematically by using the exponential function. The result of this process is to obtain a fully encrypted image. The image required to be protected from detection and discrim-ination is hidden behind the encrypted image. The proposed system contains two algorithms. The first algorithm is used for encoding and hiding, but the second algorithm is designed for returning and decoding the main image to its original state with very efficiently.


Introduction
Images encryption strategies are broadly utilized to overcome the issue of safe transferring for both images and messages via electronic transfer media both images and messages via electronic transfer media by utilizing the classical cryptographic processes [1][2][3]. However, the main problem of this method is that it is limited use remains with the huge amounts of data or high-resolution images [4,5]. The process of hiding the board image was completed after removing the most important part of the data in the embedded image. This data was saved because it is considered as a decryption key. The fundamental indication of this research paper is to stow away and encrypt the full image interior another one [6]. At first: images should have analyzed using wavelet transform formula, where the images go through levels of (DWT). This process produced four factors conditions, (ca), (ch), (cv), and (cd). Then comes the process of clearing enough space to include target image components on embedded image components. To make the appropriate images more secretly, exponential function math was used. Decryption was mainly based on returning the last discarding values to their original positions of images, then it takes the Inverse Discrete Wavelet Transform (IDWT) to produce un-secure data. The most objective of this strategy is to hide images with 2-D and 3-D on other images to produce a single encrypted image with tall effectiveness.

Literature review
Some authors show that a biometric verification system which usages two individual biometric structures collective by waterline inserting with secret PIN encryption to get a non-unique ID of each person [7][8][9]. The converted structures and models trek over unconfident the Internet or intranet of the communication system in the client-server situation. In addition, the researchers suggested a method that composite of encryption and information hiding the use of a few characteristics of Deoxyribonucleic Acid (DNA) sequences [10][11][12]. The suggested system contains two parts. The first part has the confidential information encoded by using a DNA and Amino Acids-Based Show reasonable cryptograph. the second part contains the encoded information steganography assistant which secreted into some location of DNA classification. Also, the authors suggested an LSB & DCT-based steganography process for saving the information [13][14][15][16][17]. All the information bits are implanted by modifying the slightest noteworthy bit low frequency bits of Discrete Cosine Transform (DCT) factors which include the image segments [11,18,19]. In [20][21][22], they suggest improved protection for the data. By using encryption and steganography. The information is encrypted and hidden behind an image then transferred to the cloud afterward. The image can be downloaded whenever it seems appropriate and the data can be decoded to recover the original file. In [23], They used the RSA encryption algorithm and image steganography for data concealment, as well as the LSB approach. The Advanced Encryption Standard (AES) algorithm was adjusted and used to encode the secret message. The encrypted message was protected using this technique. In [24][25][26][27], A technique used on the advanced LSB (least significant bit) and RSA algorithm was discussed. It is less chance of an attacker being enabled to use steganalysis to recover data when matching data to an image. In [28], They suggest a new form of steganography based on gray m level modulation using image transformation, hidden key, and cryptography for true color images. Both the private key and the secret data are initially encoded using multiple encryption algorithms (bitxor processing, bit shuffling, and stego key based encoding); then encoded in the pixels of the host image. In addition, before data hiding, the input image was transposed. Objective analysis employing several image quality evaluation criteria is used to evaluate the proposed technique, which shows promising results in terms of secret data and preservation. In [29], They suggest a new combination method of cryptanalysis and steg analysis by using an HTML file. RJDA is a method that uses LSB (least significant bit) as an algorithm for steganography and encryption/decryption. Confidentiality is one of most critical security criteria to ensure that the purpose of saving or transmitting data cannot be interpreted by any other unauthenticated person. In [30], They implement techniques that combine cryptography and steganography to encode the data as well as to conceal the image details. It provides the data being transmitted with two layers of protection and also focuses on the power of mixing methods of cryptography and steganography. In [31], They use LSB (Least Significant Bit) as a steganography method and AES, RSA, DES, 3DES, and Blowfish as cryptographic algorithms to encrypt the information that should be concealed in an image. The work in this paper demonstrates an increase in the capacity of the current steganography techniques to accommodate. In this paper, a new method which combine both of techniques is proposed to obtain better results. a method involving both these techniques to gain better results has developed. Firstly, the encrypted image should be encoded using the Rivest-Shamir-Adleman (RSA) symmetric encryption cryptography and transformed to American Standard Code for Information Interchange (ASCII) values. the received encrypted message in decimal format is changed to octal and finally to binary format. Secondly, the binary bits obtained are disguised inside any digital image using Least Significant Bits insertion to make a new image with a special key known as stego image, which is delivered to the recipient who executes inverse operations to acquire the encrypted image. Between the source and stego images, the Mean Squared Error and Peak Signal to Noise Ratio values are calculated, and the model accuracy by this technique are shown to be much better than most of the other methods.

3
The proposed system The proposed system is divided into main three parts. The first part is used to analyze the images by using DWT. The second part is used to hide (embed) the analytical combinations after the zeroing process behind an image. The last part is used to encrypt the image by using a mathematical exponential function. The suggested construction method compacts with the discrete 2-D DWT, whose mathematical procedures which definite as following:

1.
Check the first image which has high measurements, modified image, rectangular image (365x438).

2.
Check the next image which has low measurements; image to be encoded and secreted, tree image (258x350).

10.
Obtaining the encoded and secreted image…end

1.
Check the first image which has high dimensions, modulated image, geometric image (819x1024x3).

2.
Check the second image which has low measurements; image to be encoded and secreted, pyramid image (600x600x3).

7.
Recover the images to the original …end Images from (A to C2) of Figure (6) display the investigational results of ALGORITHM (4). Tables 1 shows the feature measurements used to show the method efficiency and to compare status Before and after the hiding and encryption activities. correlation and entropy measurements for the two-dimensional and three-dimensional images were used, as follows:

Conclusions
The technology data is fully relying on web services. This paper deals with security difficulties and how can be stopped. The cryptography and Steganography the method is used to secure data. Table I shows that that the closing of the main characteristics of the images involved in the encryption process resulted from the encrypted image with less entropy, and it is noted that the correlation values closed to zero, indicating the quality of the method, i.e., closer result to zero better quality of the method. After eliminating the protection and decrypting, the resulting images show that it is exactly the same as the main image. The approach used in this paper will assist to create a confident construction for data security.