Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination

Muneera Alotaibi, Daniah Al-hendi, Budoor Alroithy, Manal AlGhamdi, Adnan Gutub


In this paper, we propose a modification for security authentication systems in mobile devices. Our enhancement is designed to secure information transformation over the internet by combining hash, cryptography and steganography mechanisms. We used the combination for authentication, to secure mobile computing to transfer data in a trusted manner. The proposed work will use hash function to store the secret password to provide increased security. The hashed password is encrypted using AES encryption then hidden inside an image to be called back for authentication whenever needed. The security services provided by this combination mechanisms can assure authenticity, confidentiality, and integrity. Results and comparisons to different options of available mobile computing methods proved that our proposed technique is a promising research direction for real mobile security.

Full Text:



Adnan Gutub, “Exploratory Data Visualization for Smart Systems”, Smart Cities 2015 - 3rd Annual Digital Grids and Smart Cities Workshop, Burj Rafal Hotel Kempinski, Riyadh, Saudi Arabia, May 2015.

Nemshan Alharthi and Adnan Gutub, “Data Visualization to Explore Improving Decision-Making within Hajj Services”, Scientific Modelling and Research, Vol. 2, No. 1, Pages: 9-18, DOI: 10.20448/808., 1 June 2017.

Nouf Al-Juaid, Adnan Gutub, Esam Khan, “Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography”, Journal of Information Security and Cybercrimes Research (JISCR), Vol. 1, No. 1, Published by Naif Arab University for Security Sciences (NAUSS), June 2018.

Adnan Gutub, “Subthreshold SRAM Designs for Cryptography Security Computations”, ICSECS 2011 - 2nd International Conference on Software Engineering and Computer Systems, Universiti Malaysia Pahang, Kuantan, Malaysia, 27-29 June 2011.

Nouf Al-Otaibi and Adnan Gutub, “2-Layer Security System for Hiding Sensitive Text Data on Personal Computers”, Lecture Notes on Information Theory, Vol. 2, No. 2, Pages: 151-157, June 2014.

T. Mantoro, D. Permadi and A. Abubakar, “Stegano-image as a digital signature to improve security authentication system in mobile computing,” International Conference on Informatics and Computing (ICIC), Indonesia, 2017.

Mishal Almazrooie, Azman Samsudin, Adnan Gutub, Muhammad Syukri Salleh, MohdAdib Omar, Shahir Akram Hassan, “Integrity verification for digital Holy Quran verses using cryptographic hash function and compression”, Journal of King Saud University - Computer and Information Sciences, Published by Elsevier, Published online: 8 March 2018.

Adnan Gutub, Nouf Al-Juaid, “Multi- Bits Stego-System For Hiding Text in Multimedia Images Based on User Security Priority”, Journal of Computer Hardware Engineering, Vol. 1, No. 2, doi: 10.63019/ jche.v1i2.513, EnPress Publisher, 2018.

S. Ladgham, and N. Chikouche, “An improved approach for LSB-based image steganography using AES algorithm”, 5th International Conference on Electrical Engineering – Boumerdes (ICEE-B), Algeria, 2017.

Adnan Gutub, “High Speed Low Power GF(2k) Elliptic Curve Cryptography Processor Architecture”, IEEE 10th Annual Technical Exchange Meeting, KFUPM, Dhahran, Saudi Arabia, 23-24 March 2003.

Adnan Gutub and Hassan Tahhan, “Efficient Adders to Speedup Modular Multiplication For Cryptography”, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, U.A.E., 18- 20 March 2008.

Adnan Gutub and Farhan Khan, “Hybrid Crypto Hardware Utilizing Symmetric- Key & Public-Key Cryptosystems”, International Conference on Advanced Computer Science Applications and Technologies – ACSAT2012, Palace of the Golden Horses, Kuala Lumpur, Malaysia, 26-28 November 2012.

Norah AlAssaf, Basem AlKazemi, Adnan Gutub, “Applicable Light-Weight Cryptography to Secure Medical Data in IoT Systems”, Journal of Research in Engineering and Applied Sciences (JREAS), Vol. 2, No. 2, Pages: 50-58, April 2017.

S. Bukhari, M.S. Arif, S. Dilbar, and M.R. Anjum, “Enhancing security of images by Steganography and Cryptography techniques”, 6th International Conference on Innovative Computing Technology (INTECH), Ireland, 2017.

R. Tresa, A.M. Babu, and T. Sobha, “A novel steganographic scheme based on hash function coupled with AES encryption”, Advanced Computing: An International Journal (ACIJ), 2014.

S. M. Moe, “Message Authentication System using Image Steganography”, International journal of scientific engineering and technology research, Vol. 03, No. 11, Pages: 2453-2457, 2014.

Nouf Al-Otaibi and Adnan Gutub, “Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority”, Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014), Pages: 250-256, Dubai UAE, 25-26 December 2014.

Lahouari Ghouti, Mohammad K. Ibrahim, and Adnan Gutub, “Elliptic Polynomial Cryptography with Secret Key Embedding “, USPTO: United States Patents & Trademark Office , Patent number: US 8351601, Filing date: Feb 18, 2010, Patent Issue date: Jan 8, 2013.

Adnan Gutub and Alaaeldin Amin “An Expandable Montgomery Modular Multiplication Processor”, Eleventh International Conference on Microelectronics, ICM’99, Pages: 173 -176, Kuwait, November, 1999.

Adnan Gutub and Alexandre Tenca, “Efficient Scalable VLSI Architecture for Montgomery Inversion in GF(p)”, Integration, the VLSI Journal, Vol. 37, No. 2, Pages: 103-120, May 2004.

Adnan Gutub, “Merging GF(p) Elliptic Curve Point Adding and Doubling on Pipelined VLSI Cryptographic ASIC Architecture” , International Journal of Computer Science and Network Security (IJCSNS), Vol.6, No.3A, Pages: 44 – 52, March 2006.

Adnan Gutub, “Area Flexible GF(2k) Elliptic Curve Cryptography Coprocessor”, International Arab Journal of Information Technology (IAJIT), Vol. 4, no. 1, January 2007.

Adnan Gutub, Nouf Al-Juaid, Esam Khan, “Counting-Based Secret Sharing Technique for Multimedia Applications”, Multimedia Tools and Applications: An International Journal – Springer, ISSN: 1380-7501, DOI: 10.1007/s11042-017-5293-6, Published online: 2 November 2017.


  • There are currently no refbacks.