Riyadh Jameel Toama,Nada Hussein M. Ali,






The rapid development in the technology of information and the necessity of transferring the information lead to the importance of the valuable and sensitive information protection is the major demand of users. Current research papers presenting a method for protection of a secret gray scale image and it is composed of four phases. First phase calculates the hash value using the SHA-256 type of hash function to make sure that there is no manipulating, altering or changing on the content of the secret image. The second phase is the encryption process for the secret image using the AES encryption algorithm. Third phase applied Shamir secret sharing scheme by splitting the encryption key of the encryption algorithm used in the previous phase into a number of shares. The final phase is for embedding secret image into an appropriate cover image using Discrete Wavelet Haar (DWH), the cover image is divided into four or more parts according to the iteration numbers that chooses manually. The Least Significant Bit (LSB) technique used for hiding the secret image in a cover image. The results obtained from the proposed method approved that the secret image completely restored without any change, moreover the correlation coefficient between the secret and the retrieved image is high. After the process of reconstruction of the stego image by the proposed method, the test results of quality of image were good with MSE 1.63 and PSNR 46.008 in Lena image.


I. Ashutosh Gupta, and Sheetal Kaushik. “A Review: RSA and AES Algorithm.” IITM Journal of Management and IT, Vol.8, Issue 1, pp: 82-85, 2017.‏
II. Dahat, V. Ankush, and V. ChavanPallavi. “Secret sharing based visual cryptography scheme using CMY color space.” Procedia Computer Science, Vol 78, Issue C, pp: 563-570, 2016.‏
III. Essam H. Houssein, Mona AS Ali, and Aboul Ella Hassanien. “An image steganography algorithm using haar discrete wavelet transform with advanced encryption system.” 2016 Federated Conference on Computer Science and Information Systems (FedCSIS), pp:641-644, 2016.‏
IV. Je SenTeh, Kaijun Tan, and Moatsum Alawida. “A chaos-based keyed hash function based on fixed point representation.” Cluster Computing, Vol. 22, Issue 2, pp: 649-660, 2019.‏
V. Jr. Wenceslao, V. Felicisimo “Enhancing the Performance of the Advanced Encryption Standard (AES) Algorithm Using Multiple Substitution Boxes.” International Journal of Communication Networks and Information Security, Vol. 10, issue 3, p.496, 2018.
VI. Kaiser J. Giri, Mushtaq Ahmad Peer, and P. Nagabhushan. “A robust color image watermarking scheme using discrete wavelet transformation.” IJ Image, Graphics and Signal Processing, Vol. 1, pp: 47-52, 2015.‏
VII. K. Shankar, and P. Eswaran. “Sharing a secret image with encapsulated shares in visual cryptography.” Procedia Computer Science, Vol. 70, pp: 462-468, 2015‏
VIII. K. Shankar, and P. Eswaran. “A new k out of n secret image sharing scheme in visual cryptography.” 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp:1-6, 2016.‏
IX. K. Shankar, M. Elhoseny, R. S. Kumar, S. K. Lakshmanaprabu and X. Yuan, “Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique.” Journal of Ambient Intelligence and Humanized Computing, pp: 1-13, 2018.‏
X. L. Liu, Y. Lu, X. Yan, and S. Wan, “A progressive threshold secret image sharing with meaningful shares for gray-scale image.” 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), pp:380-385, 2016.‏
XI. M. Abdullah, “Advanced encryption standard (AES) algorithm to encrypt and decrypt data”. Cryptography and Network Security, Vol. 16, 2017.
XII. M. M. Abdulwahid, O. A. S. Al-Ani, M. F. Mosleh and R. A. Abd-Alhmeed. “Optimal access point location algorithm based real measurement for indoor communication”. In Proceedings of the International Conference on Information and Communication Technology, pp: 49-55, 2019.‏
XIII. M. S. Sudha, and T. C. Thanuja. “Randomly tampered image detection and self-recovery for a text document using Shamir secret sharing.” 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, pp: 688-691, 2016.‏
XIV. Po-Cheng Wu, and Liang-Gee Chen. “An efficient architecture for two-dimensional discrete wavelet transform.” IEEE Transactions on circuits and systems for video technology, Vol. 11, Issue 4, pp: 536-545, 2001.‏

XV. R. Rahim, N. Kurniasih, F. Handayanna, L. S. Dewi, E. G. Sihombing, E. Arisawati, and I. Sulistiyowati. “Enhanced pixel value differencing with cryptography algorithm”. In MATEC Web of Conferences, Vol. 197, p. 03011. EDP Sciences‏ 2018.
XVI. Sahar A. El_Rahman, “A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information.” Computers & Electrical Engineering, Vol. 70, pp: 380-399, 2018.‏
XVII. Thakral, Shaveta, and PratimaManhas. “Image Processing by Using Different Types of Discrete Wavelet Transform.” International Conference on Advanced Informatics for Computing Research. Springer, Singapore,pp: 499-507, 2018.‏
XVIII. V. Kalist, P. Ganesan, B. S. Sathish and J. M. M. Jenitha “Possiblistic-Fuzzy C-means clustering approach for the segmentation of satellite images in HSL color space”. Procedia Computer Science, Vol. 57, pp: 49-56, 2015.

View Download