IBN AL- HAITHAM J. FOR PURE & APPL. S CI. VOL.24 ( 3) 2011 Proposal for Exchange Text message Based o n Image R. J.Mohammed Departme nt of Computer Science,College of Education I bn-Al-Haithem , Unive rsity of Baghdad Received in : 1, Septe mber, 2010 Accepte d in : 13, March, , 2011 Abstract The messages are ancient method to exchange information between p eoples. It had many way s t o send it with some security . Encry p tion and st eganography was oldest way s t o message security , but there are st ill many p roblems in key generation, key distribution, suitable cover image and others. In this p aper we p resent p rop osed algorithm to exchange security message without any encry p tion, or image as cover to hidden. Our p rop osed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which alway s exchange message between them. To send any message text the sender Converts message to ASCII code. Chose one image from its (CIS) .Locate for each ASCII code in red or green or blue band color of chosen image. Store(x,y ) location and color of corresp ond value. Aft er that draw lines in graphic line image (GLI) by using this (x,y ) and S (letter sequence) and color with white background. Then send the graphic lines image (GLI) with serial number of chosen image from (CIS) to receiver. After receiving the (GLI) in other side, the receiver will choose image from its (CIS) according to serial number which it received then doing some st eps to disp lay the extract message. Key words: st eganography ,encry p tion , information hiding, mail ,history of mail, color image ,digital image. Introduction The messages are old method to exchange information between p eoples, which had many way s t o p erform it .Some of them clay p laques, wood p laques, p aper and others to write on it and then send by different ways without any security .In modern decade, the idea of exchange is st ill as it but the tools are different from country to other with more security and fast media to transfer it. M any methods had been used for message security . Encoding letters more security transmition between sender and receiver but the difficulty is to find and exchange of secret keys. So the definition of encoding or cipher is the science of writing in secret codes , addresses all of the elements necessary for secure communication over an insecure channel, namely p rivacy, confidentiality , key exchange, authentication, and non-repudiation. But cryp tography does not alway s p rovide safe communication. Ot her methods used for security message by hidden the message into p allet of image file. The p icture will not be modified, just the order of the color within the p alett e is slightly modified in order to keep our secret message ,a viewer unable to know what are the change, because the hidden message will be p ut inside the color p alett e using the lest significant bit(LSB). This method is from steganography methods .So the definition of Steganography is the science of hiding information. Whereas the goal of cryp tography is to make data unreadable by a third p arty , the goal of st eganography is to hide the data from a third p arty . IBN AL- HAITHAM J. FOR PURE & APPL. S CI. VOL.24 ( 3) 2011 Ot her method mixed between encry p tion method and st eganography method to more p rotect. But in our prop osed algorithm to exchange security message without any encry p tion, or image as cover to hidden, by p resenting new method to p rotect message and send with higher security by using image color p allet not as in encry p tion or st eganography techniques by collecting set of image and sent it to receiver to use it with received graphic image, to extract text message without useing any key. History of post M ail, or p ost , is a method for transmitting information and tangible objects, where in written documents, ty p ically enclosed in envelopes and also small p ackages are delivered to destinations around the world. Any thing sent through the post al sy st em is called mail or p ost . [1] The art of communication by written documents carried by an intermediary from one p erson or p lace to another almost certainly dates back nearly to the invention of writing. However, development of formal p ost al sy st ems occurred much later. The first documented use of an organized courier service for the diffusion of written documents is in Egy p t, where Pharaohs used couriers for the diffusion of their decrees in the territory of the State (2400 BC) . [2] Anot her important p ost al service was created in the Islamic world by the caliph M u'awiyy a; the service was called barid, by the name of the towers built to p rotect the roads by which couriers traveled. Well before the M iddle Ages and during them, homing p igeons were used for p igeon p ost , taking advantage of a singular quality of this bird, which when taken far from its nest is able to find his way home due to a p articularly developed sense of orientation. M essages were then tied around the legs of t he pigeon, which was freed and could reach his original nest . M ail has been transp orted by quite a few other methods throughout history , including dogsled, balloon, rocket, mule, pneumatic tubes and even submarine. [3] M odern mail is organized by national and p rivatized services, which are reciprocally interconnected by international regulations, organizations and international agreements. Pap er letters and p arcels can be sent to almost any country in the world relatively easily and cheaply. The Internet has made the p rocess of sending letter-like messages nearly instantaneous, and in many cases and situations corresp ondents use electronic mail where p reviously they would have used letters (though the volume of p aper mail continues to increase).[4] The ordinary mail service was imp roved in the 20th century with the use of p lanes for a quicker delivery . The world's first scheduled airmail p ost service took p lace in the United Kingdom between the London suburbs of Hendon, Nort h London, and Windsor, Berkshire, on 9 September 1911. Some methods of airmail p roved ineffective, however, including the United States Post al Service's exp eriment with rocket mail. [5] Digital images Color image can b e modeled as three band monochrome ima ge data, where each b and of the data corresp onds to a different color. The actual information st ored in the d igital image data is brightness information in each sp ectral band. When the image is disp lay ed, the corresp onding brightness information is disp lay ed on the screen by p icture elements t hat emit light energy corresp onding to that p articular color. Typical color images are represented as red, green, and b lue or RGB images .usin g the 8-bit monochro me st andard as a model, the corresp onding color image would have 24 bit/p ixel – 8 bit for each color bands (r ed, green and blue). For many applications, RGB color information is transformed into mathematical sp ace that decoup les t he brightness information from the color infor mation. A di gital image is IBN AL- HAITHAM J. FOR PURE & APPL. S CI. VOL.24 ( 3) 2011 a representation of a two-dimensional image usin g ones and zeros (binary ). Dep ending on whether or not the image resolution is fixed, it may be of vector or raster typ e. Without qualifications, the term "d igital image" usually refers to raster ima ges also called b itmap images [6]. Images have a finite set of digital values, called picture elements or p ixels. The digital image contains a fixed number of rows and columns of p ixels. Pixels are the smallest individual element in an image, holding quantized values that rep resent the brightness of a given color at any sp ecific point. [7] The idea of Proposal algorithm for Exchange secrets message (ESM) The idea of p rop osal algorithm for exchange secret message is depends on collected set of images and gives each one of them serial number, then send to receiver a copy of this set images and with same serial number. Now we have two copies of same set images one in sender side and the other in receiver side. as in fig (1). To send any text message the sender prepare the text message and choose one image from his image set with its serial number and convert first character of text message to its ASCII value (which its value not more than 255) and then search for this ASCII value in red band of chosen image if found then st ore location of this p ixel (by st ore (x,y )) . Now we have four p arameters (x,y ,s and r) - x,y :- location of pixel - S :- sequence of character in text message and column number in graphic image. - R:- red color. By using these four p arameters to draw line in image box with st art p oint(s,x) and end p oint (s,y ),with red color for the following text message " Steganography is the ancient art of embedding a secret message into a seemingly harmless message " by using one image from the bellow collection images set which is t he serial number for it (81239) show in Fig (2) Else if we not found ASCII value of character in red band then search it in green band and determine four parameter with green color . Else search for it in blue band and determine the four p arameter with blue color and draw line in image box. Now we have one line with color red or green or blue in image box represents first character of text message this p rocedure repeat to each character one after other. Aft er converting text message to color line we will get new image with line shap e with different colors in white background. Add serial number of chosen image to graphical lines image (GLI), and then send it to receiver. In receiver side, to extraction text message the receiver will: Choose image from image set according to receive serial number and then read received graphic line image (GLI) column by column to determine st arting p oint(s,x) and end p oint (s,y ) of color line ,now the reciever has four p arameters x,y ,s and color which means:- - x,y the location of pixel value in chosen image . - S the sequence of character in text message and column number in graphic lines image (GLI) - C the color band of (x,y )p oint . Not e:- The value of p ixel(x,y ) for C color band rep resents character value (char1). Repeat up p er procedure with each column of new line image (NLI). IBN AL- HAITHAM J. FOR PURE & APPL. S CI. VOL.24 ( 3) 2011 Concatenate char1,char2,…….charn to disp lay the text message. Algorithm of proposal (ESM) The prop osal algorithm has three st ages as following: 1- S tart stages: to p rep are images set:- 1.1 collection set images (CIS) 1.2 gives serial number for each image in the set 1.3 sends cop y of collected images set (CIS) with its serial number to receiver 2- S ender si de stage : to send message :- 2.1 chose one image from (CIS) with its serial number 2.2 p repare text message 2.3 for i th character in text message convert it t o ASCII code 2.4 For each p ixel in chosen (CIS) comp ute red, green, and blue values as following: r= p ixel (x,y ) mode 256 g=int (p ixel(x,y ) /256) mod 256 b=int (p ixel(x,y ) /(256)^ 2 )mod256 Where r, g and b >=0 and r,g and b<=255 2.5 locate for ASCII value of i th character in r band of pixel color if found:- - Store(x,y ) of p ixel location. - Store i th character in(S) which rep resents sequence of character - Store color band (CB) Else repeat st ep 2.5 with g band of pixel color Else repeat st ep2.5 with b band of pixel color 2.6 draw line in graphic line image (GLI) use the following p arameters - Start p oint of line is(s,x) - End point of line is(s,y ) - Color of line is (CB) 2.7 add 1 to i th 2.8 repeat st eps from 2.3 to 2.7 until end of text message. 2.9 sent graphic line image (GLI) with white background and chosen (CIS) serial number 3- Recei ver side stage : to extract text message 3.1 choose image from receiv ed (CIS) according to receiv ed serial number r 3.2 for each co lumn in received (GLI) with not white color locate for line start p oint and end point for -st ore start p oint in(s,x) in c th column -st ore end p oint in(s,y ) in c th column -st ore color of line in (CL) color line 3.3 locate for p ixel (x,y ) in chosen (CIS) with (CL) band color and -convert its value to character -st ore the character in chars where s represents the sequence character in text message 3.4 add 1 to c th 3.5 repeat the step s from 3.2 to 3.3 3.6 concatenate char1, char2,………charn due to its (sequence as in s) 4- End stage:-disp lay the text message IBN AL- HAITHAM J. FOR PURE & APPL. S CI. VOL.24 ( 3) 2011 6. Implementation of proposal algorithm (ES M) The prop osal algorithm (ESM ) is imp lemented by VB comp uter language with followin g three st age:- 1. Stage of message send:-After collected image set and send it t o receiver with serial number for each ima ge. We can send text message which transmitted to (GLI) with following st eps: a- Input text message b- Choose one image from (CIS) c- Save new image box with serial number Not es: when text message bo x is emp ty the p rogram disp lay s alarm messa ge box to input message. 2. Stage of send new ima ge box (NIB):- this st age can be doin g with many way s of transmission such internet and others 3. Stage of extract text image: - in this stage extract the message from received (NIB) and serial numb er as in fig (3). Conclusion Send message is st ays an imp ortant task since every exchan ge information depends on exchan ging message so in our paper we try to p resent new which has good p rop erties to be simp le method with high security .many p oint we conclude from the work such as: 1- The prop osal algorithm have h igh security because there is no hacker can discover the message from (NIB) or chan ge in source image in( CI S) but the hacker may cause noise by chan ge in (GLI) 2- Each message can b e send in many (NIB) by chose other image from (CIS) 3-The prop osal method does not match steganogr aphy and encryption method 4- Its simp le method does not need key to security and does not need cover to hide the message. 5- The same collect images set (CIS) can used with infinite time with infin ite message. 6- There is no value of any character in (NIB) only location of that value characters in (CIS) of sender 7- we can’t use a lot of information in the text message because we need a huge number of p ixel 8- This algorithm is used with p eoples who alway s exchan ge message between them. Re ferences 1. Norbert, P. (2003) , Hindu Kingship and Polity in Precolonial India, New York : Cambr idge University p ress . 2. Dorn, H. and M acClellan, J, E. (2006) ,Scien ce and Technology in World Hist ory , An Introduction, Baltimore[etc] : Johns Hop kins University p ress . 3. Lowe, R. (1951), Ency clop edia of British Emp ire Postage Stamp s, (v. III), London. 4. M azumdar, M , L. (1990), The Imperial Post Offices of British India, Calcutt a: Phila Publications. 5. M ote, F, W. and John K, F. (1998) ,The Cambridge Hist ory of China, Cambridge : Cambridge University p ress IBN AL- HAITHAM J. FOR PURE & APPL. S CI. VOL.24 ( 3) 2011 6. www.adobe.com/p roduct/p hotoshop /extend.disp lay tab2.html 7. Anderson, R;(12 October 2006) ,The Universal Phot ographic Digital Imaging Guid elines, vers. 2.0, UPDIG: p . 8 ,www.up dig.org Sender side Serial number [ 0907988 005243266 10003124 81239 Receiver side 10003124 005243266 0907988 81239 Fig. (1): Two copies of same collection i mages se t (CIS ) one in sender si de and the other receiver side and each image have se rial number IBN AL- HAITHAM J. FOR PURE & APPL. S CI. VOL.24 ( 3) 2011 A B Fig. (2): A:- source i mage from (CIS )the se rial number for it(81239) B:- using four paramete r (x,y,s,r) to draw graphi cal line image (GLI) B A C Fig .(3): A:-(CIS ) B:-(NIB) C:- Extract message 2011) 3( 24مجلة ابن الھیثم للعلوم الصرفة والتطبیقیة المجلد مقترح لتبادل الرسائل باالعتماد على الصور روال جاسم محمد جامعھ بغدادقسم علوم الحاسبات، كلیھ التربیة ابن الھیثم، 2010، ایلول،1: استلم البحث في 2011،اذار ، 13: قبل البحث في الخالصة (التشـفیر. ةلسـریارسائل مع بعض إلرسال ال عدیدة قائهناك طر .لتبادل المعلومات بین الناس ةقدیم ةالرسائل هي طریق (Encryptionإخفاء البیانات ةوطریق)(Steganography الرسـائل ولكـن مازالـت هنـاك ةللحفـاظ علـى أمنیـ ةق قدیمائهي طر الخ ..... "تاح أو توزیعه أو استخدام الصورة المناسبة غطاءفي إیجاد المف عدیدة مشاكل دون اســتخدام أي مفتـاح للتشــفیر أو اســتخدام مـن لتبـادل الرســائل بصـورة ســریه ةمقترحــ ةفـي هــذا البحـث ســنقدم خوارزمیـ .لإلخفاء فیها ةصور إنهـمحیـث دة لـدى المرسـل واألخـرى لـدى المسـتلمواحـ) .CIS(خوارزمیتنا المقترحة تعتمد مجمـوعتین متمـاثلتین مـن الصـور یقـوم ثـم ) ASCII CODE(ل الرسـالة إلـى یـحو بتلمرسـل یقـوم اوإلرسـال أي رسـالة نصـیة . یكونـون معتـادین علـى تبـادل الرسـائل فـي مصـفوفة اللـون األحمـر أو ) ASCII CODE(یحـدد موقـع لكـل و ) CIS(باختیار صورة واحدة من مجموعة الصور التي لدیه التـي تـم ) ASCII CODE(وألوانهـا لكـل قیمـة تماثلهـا فـي) x,y(مواقـع مـن الصـورة المحـددة ویخـزن) RGB(األخضـر أو األزرق رف واللـــون وتسلســل كــل حــ) x,y(مجموعــة مــن الخطــوط فــي صـــورة واحــدة باالعتمــاد علــى إحــداثیات ترســم تحدیــدها مســبقا ثــم إرسال الصورة المرسـومة والمتكونـة مـن الخطـوط مـع الـرقم التسلسـلي للصـورة األصـلیة التـي ضاء ومن ثم یقوم بخلفیة بی عمالباست، یقـوم المسـتلم باختیـار الصـورة .مـن المسـتلم ) GLI(بعـد اسـتالم الصـورة المرسـومة . وٕارسـالها إلـى المسـتلم ) CIS(تـم اختیارهـا مـن .عرض الرسالة المستخلصةل عدیدة خطواتب على الرقم التسلسلي المرسل ویقومباالعتماد ) CIS(المحددة من الصور التي لدیه -: ةلمفتاحیاالكلمات steganography ,encryption , information hiding, mail ,history of mail, color image ,digital image.