Author
Listed:
- Safwat Hamad
- Omar Fitian Rashid
- Hind M Al-Dabbas
Abstract
Classic security methods are becoming vulnerable because of technology advancements. The process of combining cryptography and steganography led to overcoming this, where this combination will save the information from potential attackers. This paper proposed a new text security method by combining the cryptography technique and steganography technique, where cryptography is used to encode the message, while steganography is used to hide the ciphertext within an image. The proposed cryptography system has five steps. The first is done by building an RNA sequences generation table to convert the message to RNA sequences, the next step is done by creating a table to convert RNA sequences to decimal numbers. In the third step, the achieved decimal values are converted to binary numbers; after that, used True Random Number Generators method generates the key, and finally, an XOR operation is applied between achieved binary numbers and the generated key. The results achieved by the XOR operation are considered as the ciphertext. Two steps to the proposed steganography method. The first step is done by building a codebook table to select the part of the pixel to store the bit inside it, where the selection part can be either red, green, or blue, and then used a least significant bit to store the bit with no effects on the image. The proposed method presents an efficient solution to secure data, and this method can be applied in different fields, such as information security and privacy protection.
Suggested Citation
Safwat Hamad & Omar Fitian Rashid & Hind M Al-Dabbas, 2025.
"Text cryptography and steganography based on RNA sequences generation, true random number generators, and codebook method,"
PLOS ONE, Public Library of Science, vol. 20(12), pages 1-12, December.
Handle:
RePEc:plo:pone00:0338700
DOI: 10.1371/journal.pone.0338700
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:plo:pone00:0338700. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: plosone (email available below). General contact details of provider: https://journals.plos.org/plosone/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.