Using Cucumber Plants Leaves A Cover To Hiding Encryption Text

The article presented a way to increase the efficiency of hiding information by relying on the leaves of the cucumber plant and using it as a cover to hide the information after applying a set of digital image processing techniques to this image. As for the text to be hidden, the text is initially encrypted based on an innovative cryptographic algorithm, three criteria were used to measure The efficiency of the algorithm is psnr, mse, rmse.


Introduction
Hiding information is an artistic method, science, or practice in which you try to hide important and confidential information, pictures, or files within pictures or other files [1][2]. Recent experiments have shown that data can be hidden using various methods within different types of digital files. The main task or goal of hiding information is that the payload data does not reach the investigators who get the computer data checked. Only the person who sends the hidden data and the target authorized to receive the data; But for anyone else, for the data to be safe, the object that contains the hidden data should just appear as a regular daily object. It is the reference referred to in information hiding techniques [3].
One of the areas of research in information security that has been around for several years is data encryption and caching. However, although both technologies aim to protect confidential data, they possess different concepts. The encryption includes the mechanism of protecting the communication by encrypting the data before sending it or sharing it without hiding the existence of the connection, that is, the third party (the hackers or the unauthorized party) can see the encrypted data during its transfer to the destination, which may lead to suspicion and interception and as a result try to decipher the access to the data. In contrast to the encryption process above, information hiding is the process of hiding information in the codes that make up digital files (the unauthorized party cannot be in any condition) such as voice, text, image, or video while preventing unwanted sources from detecting the existence of the connection. That is, the data transmission remains confidential between the parties connected to it. This ensures that data protection is well preserved and is essential in any type of communication.
The information hiding system consists of three main parts: the sender, the communication channel, and the recipient. The transmitter is the first part that transmits confidential data and the recipient is the third part to which the data is intended while the channel helps in transmitting data. In hiding information 2 from digital images, confidential data can be hidden in the appropriate cover image. Which can be transferred directly over an insecure public network, we see the output is the Stego image (Image containing hidden data) as shown in Figure (1). Figure 1. display the process that using to hiding information in image In security systems, information hiding is a broad system that includes a wide range of many areas of research. The word "hiding" refers to the protection of confidential information through an unknown communication [4].
In addition, due to the large percentage of repetition encountered in the digital image in the event of the digital image receding and insufficient pixels in the image to cover the data to be hidden, many ways to hide information that actually hide the data in digital images have been presented in [5]. A method has been suggested in which pixels are randomly chosen to hide confidential data randomly [6], as well as to process an image that contains stego information. Using Mysterious Hybrid Neural Networks [7] implemented an adaptive method.
An adaptive method was implemented that includes data in the cover image's interest areas. introduced a recent model intended to work mixing information hiding in cybersecurity [8]. The visual quality of stego image has also been improved in the layout that uses a new technology that works on 2-bit mirroring and optimized pixel tuning [9]. To hide the secret data in the image, the cover image has been divided into parts and the data that will be hidden has been divided into slides. Multiple Their technology has greatly improved cognition as data has been hidden in blocks with less impact on the visual quality of the stego image [9].
In further research, we must determine the inclusion positions based on the smooth areas and the edge before hiding the data [10]. To maintain data security, confidential sharing and information hiding were applied to apply the approach used to include data in images [9]. Done A method of constructing a blind information hiding in the image through the use of discrete wavelet transformation (DCT) proposed by [12]. Being blind means that the original cover image is not required to extract the hidden data which makes the data transfer undetectable by any unauthorized parties.

Related Work
The researcher suggested (1) a modern way in which the process of including the texts that will be hidden depending on the HUE layer that is created by converting the color system of the digital image (RGB) to the HSV system is selected, then specific areas are identified in this layer that are used to hide these texts After converting these texts to a binary system, the researcher finally returns the image to the original color scheme (RGB).
As for the researcher (2) he proposed a method in which he relied on using the least important bit which is the most common in the process of concealing information in addition to increasing the complexity procedures by choosing pixels in which the confidentiality is included in the data depending on an important feature in the digital image which is the degree of contrast Colors for the digital image. This is where one of the three RGB layers of the digital photo is chosen.
Researcher (3) The researchers presented a comparative study of the effect of the color system of the digital image on the data embedding process, by embedding the data using two methods that result in concealing the data in the digital image.
The first method is to include the data based on the eighth bit, while the second is to include the data using the seventh bit. Then, the researcher conducted a comparative study on eight color systems.
As for the researcher (4), he presented a method to include the data based on the digital image after converting it to the frequency domain using contour transformations, after which the researcher works to include the data in the digital image. Other researchers in this field have introduced advanced technologies that rely on some techniques of artificial intelligence systems to increase the efficiency of the inclusion process (15)(16)(17)(18).

Measurement Criteria
There are several criteria that can be adopted in the process of including data, which generally measure the impact of the inclusion process on the cover used from these standards that have been used [19] .

Suggest Algorithm
The dependence on the image of the leaves of the sick cucumber plant is because the image is of high contrast in it because it has a difference in color. Also, messaging with this image does not bring doubt, because the most common belief is to use it for diagnosis the figure(2) below show suggest algorithm .

Conclusions
One of the most important multimedia that can be used as a cover in the process of including data is the digital image, which contains a large color contrast in the image pixels and for this, we have adopted in our article selection the digital images for a diseased plant leaves that achieve high color contrast in pixels for this type of digital image for different areas in the image. This enables us to include or hide data with high accuracy and efficiency in this type of image. And it achieves the goal, which is difficult to identify or access to data if there is any manipulation of the image that contains the important data. The diagrams above show that there is a direct relationship between the size of the text that needs to be hidden with the effect on the cover image, where the more data volume required Hiding them had a greater impact on the cover, and through the results, it also turns out that reliance on these images gave good results in the process use of including data.