IBN AL- HAITHAM J. FOR PURE & APPL. S CI.         VOL.24 ( 3) 2011 

 

Proposal for Exchange Text message Based o n Image         
                       

R. J.Mohammed                                                                                   

Departme nt of Computer Science,College of Education I bn-Al-Haithem , 
Unive rsity of Baghdad  

Received  in :  1, Septe mber, 2010  
Accepte d  in :  13, March, , 2011              

 

 Abstract 
     The messages are ancient method to exchange information between p eoples. It had many  
way s t o send it with some security . 

    Encry p tion and st eganography  was oldest way s t o message security , but there are st ill many 
p roblems in key generation, key distribution, suitable cover image and others. In this p aper 
we p resent p rop osed algorithm to exchange security  message without any encry p tion, or 
image as cover to hidden. Our p rop osed algorithm depends on two copies of the same 
collection images set (CIS), one in sender side and other in receiver side which alway s 
exchange message between them. 
      To send any message text the sender Converts message to ASCII code. Chose one image 
from its (CIS) .Locate for each ASCII code in red or green or blue band color of chosen 
image. Store(x,y ) location and color of corresp ond value. Aft er that draw lines in graphic line 
image (GLI) by  using this (x,y ) and S (letter sequence) and color with white background. 

Then send the graphic lines image (GLI) with serial number of chosen image from (CIS) to 
receiver. After receiving the (GLI) in other side, the receiver will choose image from its (CIS) 
according to serial number which it received then doing some st eps to disp lay  the extract 
message. 

Key words: st eganography  ,encry p tion , information hiding, mail ,history  of mail, color 
image ,digital image.  
 

Introduction 
   The messages are old method to exchange information between p eoples, which had many  
way s t o p erform it .Some of them clay  p laques, wood p laques, p aper and others to write on it 
and then send by  different ways without  any security  .In modern decade, the idea of exchange 
is st ill as it but the tools are different from country  to other with more security  and fast  media 
to transfer it. M any methods had been used for message security . Encoding letters more 
security  transmition between sender and receiver but the difficulty  is to find and exchange of 
secret keys. 

    So the definition of  encoding or cipher is the science of writing in secret codes , addresses 
all of the elements necessary  for secure communication over an insecure channel, namely  
p rivacy, confidentiality , key exchange, authentication, and non-repudiation. But cryp tography  
does not alway s p rovide safe communication. 

    Ot her methods used for security  message by  hidden the message into p allet of image file. 
The p icture will not be modified, just the order of the color within the p alett e is slightly 
modified in order to keep  our secret message ,a viewer unable to know what are  the change, 
because the hidden message will be p ut inside the color p alett e using the lest  significant 
bit(LSB). This method is from steganography  methods .So the definition of Steganography is 
the science of hiding information. Whereas the goal of cryp tography  is to make data 
unreadable by  a third p arty , the goal of st eganography  is to hide the data from a third p arty .  



IBN AL- HAITHAM J. FOR PURE & APPL. S CI.         VOL.24 ( 3) 2011 
 

Ot her method mixed between encry p tion method and st eganography  method to more p rotect. 
But in our prop osed algorithm to exchange security  message without  any encry p tion, or image 
as cover to hidden, by  p resenting new method to p rotect message and send with higher  
security  by  using image color p allet not as in encry p tion or st eganography  techniques by  
collecting set of image and sent it to receiver to use it with received graphic image, to extract 
text message without useing any key.  

 

History of post 
    M ail, or p ost , is a method for transmitting information and tangible objects, where in 
written documents, ty p ically enclosed in envelopes and also small p ackages are delivered to 
destinations around the world. Any thing sent through the post al sy st em is called mail or p ost . 
[1] 

The art of communication by  written documents carried by  an intermediary  from one p erson 
or p lace to another almost certainly dates back nearly  to the invention of writing.

 
 

      However, development of formal p ost al sy st ems occurred much later. The first 
documented use of an organized courier service for the diffusion of written documents is in 
Egy p t, where Pharaohs used couriers for the diffusion of their decrees in the territory  of the 
State (2400 BC)

. 
[2] 

Anot her important p ost al service was created in the Islamic world by  the caliph M u'awiyy a; 
the service was called barid, by  the name of the towers built to p rotect the roads by  which 
couriers traveled. 
     Well before the M iddle Ages and during them, homing p igeons were used for p igeon p ost , 
taking advantage of a singular quality  of this bird, which when taken far from its nest is able 
to find his way home due to a p articularly  developed sense of orientation. M essages were then 
tied around the legs of t he pigeon, which was freed and could reach his original nest . 
M ail has been transp orted by  quite a few other methods throughout history , including 
dogsled, balloon, rocket, mule, pneumatic tubes and even submarine.

 
[3]                          

    M odern mail is organized by  national and p rivatized services, which are reciprocally  
interconnected by  international regulations, organizations and international agreements. Pap er 
letters and p arcels can be sent to almost any country  in the world relatively  easily and 
cheaply. The Internet has made the p rocess of sending letter-like messages nearly 
instantaneous, and in many  cases and situations corresp ondents use electronic mail where 
p reviously  they would have used letters (though the volume of p aper mail continues to 
increase).[4]                

The ordinary  mail service was imp roved in the 20th century  with the use of p lanes for a 
quicker delivery . The world's first scheduled airmail p ost  service took p lace in the United 
Kingdom between the London suburbs of Hendon, Nort h London, and Windsor, Berkshire, on 
9 September 1911. Some methods of airmail p roved ineffective, however, including the 
United States Post al Service's exp eriment with rocket mail. [5]

 

 

Digital images 
    Color image can b e modeled as three band monochrome ima ge data, where each b and of  
the data corresp onds to a different color. The actual information st ored in the d igital image 
data is brightness information in each sp ectral band. When the image is disp lay ed, the 
corresp onding brightness information is disp lay ed on the screen  by  p icture elements t hat emit  
light energy  corresp onding to that p articular color. Typical color images are represented as 
red, green,  and b lue or  RGB images .usin g the 8-bit monochro me st andard as a model, the 
corresp onding color image would  have 24 bit/p ixel – 8  bit for each color bands (r ed, green 
and blue).  For many applications, RGB color  information is transformed  into mathematical 
sp ace that decoup les t he brightness information from the color infor mation. A di gital image is 



IBN AL- HAITHAM J. FOR PURE & APPL. S CI.         VOL.24 ( 3) 2011 
 

 a representation of a two-dimensional image usin g ones and zeros (binary ). Dep ending on  
whether or not the image resolution is fixed, it may  be of vector or raster typ e. Without 
qualifications, the term "d igital image" usually refers to raster ima ges also called b itmap 
images [6].  

Images have a finite set of digital values, called picture elements or p ixels. The digital image 
contains a fixed number of rows and columns of p ixels. Pixels are the smallest  individual 
element in an image, holding quantized values that rep resent the brightness of a given color at 
any sp ecific point. 

 
[7] 

 

The idea of Proposal algorithm for Exchange secrets message 
(ESM) 
       The idea of p rop osal algorithm for exchange secret message is depends on  collected set 
of  images  and gives each one of them serial number,  then send to  receiver a copy  of this set 
images and with same serial number.  

Now we have two copies of same set images one in sender side and the other in receiver side. 
as in fig (1). 

To send any text message the sender prepare the text message and choose one image from his 
image set with its serial number and convert first character of text message to its ASCII value 
(which its value not more than 255) and then search for this ASCII value in red band of 
chosen image if found then st ore location of this p ixel (by  st ore (x,y )) . 

Now we have four p arameters (x,y ,s and r) 

- x,y :- location of pixel 
- S :- sequence of character in text message and column number in graphic image. 

- R:- red color. 

By  using these four p arameters to draw line in image box with st art p oint(s,x) and end p oint 
(s,y ),with red color for the following text message "  Steganography is the ancient art of 
embedding a secret message into a seemingly harmless message " by   using one image from 
the bellow collection images set which is t he serial number for it (81239)  show in Fig (2)  

Else if we not found ASCII value of character in red band then search it in green band and 
determine four parameter with green color .  

Else   search for it in blue band and determine the four p arameter with blue color and draw 
line in image box. Now we have one line with color red or green or blue in image box 
represents first character of text message this p rocedure repeat to each character one after 
other. 

Aft er converting text message to color line we will get new image with line shap e with 
different colors in white background. 

Add serial number of chosen image to graphical lines image (GLI), and then send it to 
receiver. 

In receiver side, to extraction text message the receiver will: 

Choose image from image set according to receive serial number and then read received 
graphic line image (GLI) column by  column to determine st arting p oint(s,x) and end p oint 
(s,y ) of color line ,now the reciever has four p arameters x,y ,s and color  which means:- 

- x,y  the location of pixel value in chosen image . 

- S the sequence of character in text message and column number in graphic lines image 
(GLI) 

- C the color band of (x,y )p oint . 
Not e:- The value of p ixel(x,y ) for C color band rep resents character value (char1). 

Repeat up p er procedure with each column of new line image (NLI). 



IBN AL- HAITHAM J. FOR PURE & APPL. S CI.         VOL.24 ( 3) 2011 
 

Concatenate char1,char2,…….charn to disp lay  the text message. 

 

Algorithm of proposal (ESM) 
     The prop osal algorithm has three st ages as following: 

    1- S tart stages: to p rep are images set:- 

    1.1 collection set images (CIS)  
    1.2 gives serial number for each image in the set 

    1.3 sends cop y  of collected images set (CIS) with its serial number to  receiver 

2- S ender si de stage : to send message :- 

     2.1 chose one image from (CIS) with its serial number  

     2.2 p repare text message 
     2.3 for i

th
 character in text message convert it t o ASCII code 

     2.4 For each p ixel in chosen (CIS) comp ute red, green, and blue values as following: 

r= p ixel (x,y ) mode 256              

    g=int (p ixel(x,y ) /256) mod 256 

    b=int (p ixel(x,y ) /(256)^
2
)mod256 

    Where r, g and b >=0 and r,g and b<=255 

  2.5 locate for ASCII value of i
th

 character in r band of pixel color if found:-  

    - Store(x,y ) of p ixel location. 

  - Store i
th

 character in(S) which rep resents sequence of character 

  - Store color band (CB) 
Else     repeat st ep 2.5 with g band of pixel color  

Else     repeat st ep2.5 with b band of pixel color  

  

2.6 draw line in graphic line image (GLI) use the following p arameters  

- Start p oint of line is(s,x)  
- End point of line is(s,y ) 

- Color of line is (CB)  

2.7 add 1 to i
th

 

2.8 repeat st eps from 2.3 to 2.7 until end of text message.  

2.9 sent graphic line image (GLI) with white background and chosen (CIS) serial number 
3- Recei ver side stage : to extract text message  

  3.1 choose image from receiv ed (CIS) according to receiv ed serial      number    r 

  3.2 for each co lumn in received (GLI) with not white color locate for line  start p oint and 
end point for  

  -st ore start p oint in(s,x) in c
th

 column 
  -st ore end p oint in(s,y ) in c

th
 column 

  -st ore color of line in (CL) color line    

3.3 locate for p ixel (x,y ) in chosen (CIS) with (CL) band color and  

   -convert its value to character  

  -st ore the character in chars  where s represents the sequence character in text    message  
3.4 add 1 to c

th
  

3.5 repeat the step s from 3.2 to 3.3 

3.6 concatenate char1, char2,………charn  due to its (sequence as in s) 
     4- End stage:-disp lay  the text message 



IBN AL- HAITHAM J. FOR PURE & APPL. S CI.         VOL.24 ( 3) 2011 

    

     6. Implementation of proposal  algorithm (ES M) 

       The prop osal algorithm (ESM ) is imp lemented by VB comp uter language           with 
followin g three st age:-     
    1. Stage of message send:-After collected image set and send it t o receiver       with serial 
number for each ima ge.    

      We can send text message which transmitted to (GLI) with following st eps:  

    a- Input text message   

  b- Choose one image from (CIS) 
 c- Save new image box with serial number  

 Not es: when text message bo x is emp ty  the p rogram disp lay s alarm messa ge  box to input 
message.    

 2. Stage of send new ima ge box (NIB):- this st age can be doin g with many      way s of 
transmission such  internet and others 
 3. Stage of extract text image: - in this stage extract the message from   received (NIB) and 
serial numb er as in fig (3).  

 

Conclusion 
Send message is st ays an imp ortant task since every  exchan ge information 

depends on exchan ging message so in our paper we try  to p resent new which has good 
p rop erties to be simp le method with high security  .many  p oint we conclude from the work 
such as:  
1- The prop osal algorithm have h igh security  because there is no hacker can discover the 
message from (NIB) or chan ge in source image in( CI S) but the hacker may  cause noise by 
chan ge in (GLI) 

2- Each message can b e send in many (NIB) by  chose other image from (CIS)  

3-The prop osal method does not  match steganogr aphy  and encryption method  
4- Its simp le method does not need key to security  and does not need cover to hide the 
message.  

5- The same collect images set (CIS) can used with infinite time with infin ite message.  

6- There is no value of any  character in (NIB) only location of that value characters in (CIS) 
of sender 
7- we can’t use a lot of information in the text message because we need a huge number of 
p ixel   

8- This algorithm is used with p eoples who alway s exchan ge message between them. 

 

Re ferences 
1.  Norbert, P. (2003) , Hindu Kingship  and Polity in Precolonial India,       

     New York : Cambr idge University  p ress . 

2.   Dorn, H. and    M acClellan, J, E. (2006)  ,Scien ce and Technology  in World Hist ory , An    
Introduction, Baltimore[etc] : Johns Hop kins University  p ress .  

3. Lowe, R. (1951), Ency clop edia of British Emp ire Postage Stamp s, (v. III),                 
London.  

4.    M azumdar, M , L. (1990), The Imperial Post Offices of British India,  Calcutt a: Phila 
Publications.  

5.   M ote, F, W. and  John K, F. (1998) ,The Cambridge Hist ory  of China,    Cambridge : 
Cambridge University  p ress  

 



IBN AL- HAITHAM J. FOR PURE & APPL. S CI.         VOL.24 ( 3) 2011 
 

6.  www.adobe.com/p roduct/p hotoshop /extend.disp lay  tab2.html  

7. Anderson, R;(12 October 2006) ,The Universal Phot ographic Digital Imaging Guid elines, 
vers. 2.0, UPDIG: p . 8 ,www.up dig.org  

      

 

 

 

 
 

 

                                   
   Sender side             

              Serial number   [        0907988                  005243266                           10003124                       81239                     

          

     

       Receiver side                  
                               10003124                   005243266                 0907988                    81239                   
           

 

Fig. (1): Two copies of same collection i mages se t (CIS ) one  in sender si de and the other 
receiver   side and each image have se rial number 

    
 

 

 

 

 
 

 

 

 

 
  

  

  

  

  

  

  



IBN AL- HAITHAM J. FOR PURE & APPL. S CI.         VOL.24 ( 3) 2011 
 

 

   

                                                        
                                    A                                                                   B 

 

 

Fig. (2): A:- source i mage from (CIS )the  se rial number for it(81239)     

             B:- using four paramete r (x,y,s,r) to draw graphi cal line image    (GLI)  

 

 

            

                    
               

                                                         B       A   
 

  
                                            C  

Fig .(3):    A:-(CIS )        B:-(NIB)       C:- Extract message  

 

 
 
  

  
  

  
  
  



 
 2011) 3( 24مجلة ابن الھیثم للعلوم الصرفة والتطبیقیة               المجلد

 

 مقترح لتبادل الرسائل باالعتماد على الصور
  

  روال جاسم محمد 

  جامعھ بغدادقسم علوم الحاسبات، كلیھ التربیة ابن الھیثم، 

  2010، ایلول،1: استلم البحث في

  2011،اذار ، 13: قبل البحث في

  

  الخالصة  
  (التشـفیر. ةلسـریارسائل مع بعض إلرسال ال عدیدة قائهناك طر .لتبادل المعلومات بین الناس  ةقدیم ةالرسائل هي طریق      

  (Encryptionإخفاء البیانات  ةوطریق)(Steganography  الرسـائل ولكـن مازالـت هنـاك  ةللحفـاظ علـى أمنیـ ةق قدیمائهي طر 

  الخ ..... "تاح أو توزیعه أو استخدام الصورة المناسبة غطاءفي إیجاد المف عدیدة مشاكل

دون اســتخدام أي مفتـاح للتشــفیر أو اســتخدام مـن لتبـادل الرســائل بصـورة ســریه  ةمقترحــ ةفـي هــذا البحـث ســنقدم خوارزمیـ       

  .لإلخفاء فیها ةصور 

 إنهـمحیـث  دة لـدى المرسـل واألخـرى لـدى المسـتلمواحـ) .CIS(خوارزمیتنا المقترحة تعتمد مجمـوعتین متمـاثلتین مـن الصـور      

یقـوم ثـم ) ASCII CODE(ل الرسـالة إلـى یـحو بتلمرسـل یقـوم اوإلرسـال أي رسـالة نصـیة . یكونـون معتـادین علـى تبـادل الرسـائل

فـي مصـفوفة اللـون األحمـر أو ) ASCII CODE(یحـدد موقـع لكـل و )  CIS(باختیار صورة واحدة من مجموعة الصور التي لدیه

التـي تـم ) ASCII CODE(وألوانهـا لكـل قیمـة تماثلهـا فـي) x,y(مواقـع  مـن الصـورة المحـددة ویخـزن) RGB(األخضـر أو األزرق

رف واللـــون وتسلســل كــل حــ) x,y(مجموعــة مــن الخطــوط فــي صـــورة واحــدة باالعتمــاد علــى إحــداثیات ترســم تحدیــدها مســبقا ثــم 

إرسال الصورة المرسـومة والمتكونـة مـن الخطـوط مـع الـرقم التسلسـلي للصـورة األصـلیة التـي ضاء ومن ثم یقوم بخلفیة بی عمالباست،

یقـوم المسـتلم باختیـار الصـورة .مـن المسـتلم ) GLI(بعـد اسـتالم الصـورة المرسـومة . وٕارسـالها إلـى المسـتلم ) CIS(تـم اختیارهـا مـن 

  .عرض الرسالة المستخلصةل عدیدة  خطواتب على الرقم التسلسلي المرسل ویقومباالعتماد ) CIS(المحددة من الصور التي لدیه

 

                                                                       -: ةلمفتاحیاالكلمات 

steganography ,encryption , information hiding, mail ,history of mail, color 
image ,digital image.