Mohammed Al-Husainy | Middle East Technical University (original) (raw)

Papers by Mohammed Al-Husainy

Research paper thumbnail of Raise the Strength of Cryptosystem Using Variety Effects

European Scientific Journal, ESJ, Apr 30, 2015

Nowadays, images became one of the most types of transmitted data through Internet. Some of these... more Nowadays, images became one of the most types of transmitted data through Internet. Some of these images carry secret information, therefore having an effective cryptosystem for hiding the information inside these images become an urgent need. Many traditional encryption methods are unable to achieve a high degree of protection for information. This paper presents nontraditional method for image encryption through applying substitution and transposition operations in different ways on both key and data. Series of (Linear and Circular), (Left, Right, Up and Down) rotation operations on (Bits and Bytes) of key and data are applied to make good confusion effects in the data. Moreover, XOR Boolean operations also applied on the key and data to make diffusion effects in the data. These two types of operations will produce a large set of keys. Using this large number of different keys in encrypting image will raise the strength of the encryption system used and achieve a high degree of protection for image. To test the security degree and performance of the encryption system, the system has been applied using different images and analyzing the results key space, key sensitivity, and statistical analysis and other criteria. From these tests, we can conclude that the encryption system can be used effectively to protect digital images.

Research paper thumbnail of Best-Job-First CPU Scheduling Algorithm

Information Technology Journal, Feb 1, 2007

Research paper thumbnail of A Tool for Compressing Images Based on Genetic Algorithm

Information Technology Journal, Mar 15, 2007

Research paper thumbnail of Image Encryption Using Genetic Algorithm

Information Technology Journal, Apr 15, 2006

Research paper thumbnail of Embedded key cryptosystem for cloud computing applications

As the internet1 and computer cloud are becoming increasingly dependable for almost all applicati... more As the internet1 and computer cloud are becoming increasingly dependable for almost all applications, data security issues are becoming crucial. In this paper, a new symmetric block cipher cryptographic algorithm is developed that would be suitable as a lightweight cryptosystem suiting database implementation for cloud computing platforms. Shannon principle of confusion and diffusion is achieved by the substitution, transposition, and mathematical operations conducted on block size of 64 bits. The private key is generated using the block content itself, and its content is embedded into the data blocks, different key is used for each block. The algorithm adopts two tables; one for the character set used and the other for the key elements generation. The confidentiality of these tables is responsible for the key strength. Experimental implementation proves the algorithm feasibility.

Research paper thumbnail of Image Encryption using a Binary Search Tree Structure-Based Key

International Journal of Computing and Digital Systems

Due to the ever-increasing cybercrime and hazards on digital information stored or in transit ove... more Due to the ever-increasing cybercrime and hazards on digital information stored or in transit over computer clouds and networks, so many encryption algorithms were developed and practically implemented. On the other hand, hackers and intruders keep on developing methods to break those algorithms. Hence, new methods are always sought and developed by researchers. A binary search tree (BST) is implemented in this paper to produce a new algorithm for image encryption. The BST is utilized to generate an encryption key that consists of two parts; local and global with flexible length capabilities that provide better security. Sharing all image contents to encrypt any byte of the source image helped to achieve Shannon's concept of diffusion and confusion. The experimental application of this algorithm has manifested a satisfactory security performance as compared with the widely used cryptographic systems such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES). These Comparisons included measurement of encryption time complexity, Peak Signal to Noise Ratio (PSNR), Entropy, encryption key space. Besides, the new method offers encryption key length flexibility and involvement of all image contents in its generation.

Research paper thumbnail of A Message Encryption Scheme inspired by Sudoku Puzzle (MESP)

International Journal of Information and Computer Security

Research paper thumbnail of Using the Binary Search Tree Structure as key to Encrypt Images

International Journal Of Computing and Digital System, Aug 23, 2021

Research paper thumbnail of Embedded key cryptosystem for cloud computing applications

Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

As the internet1 and computer cloud are becoming increasingly dependable for almost all applicati... more As the internet1 and computer cloud are becoming increasingly dependable for almost all applications, data security issues are becoming crucial. In this paper, a new symmetric block cipher cryptographic algorithm is developed that would be suitable as a lightweight cryptosystem suiting database implementation for cloud computing platforms. Shannon principle of confusion and diffusion is achieved by the substitution, transposition, and mathematical operations conducted on block size of 64 bits. The private key is generated using the block content itself, and its content is embedded into the data blocks, different key is used for each block. The algorithm adopts two tables; one for the character set used and the other for the key elements generation. The confidentiality of these tables is responsible for the key strength. Experimental implementation proves the algorithm feasibility.

Research paper thumbnail of Sound Data Compression Method Using Genetic Algorithm 1

The principal objective of this research is an adoption of the Genetic Algorithm (GA) for studyin... more The principal objective of this research is an adoption of the Genetic Algorithm (GA) for studying it firstly, and to stop over the operations which are introduced from the genetic algorithm.The candidate field for applying the operations of the genetic algorithm is the sound data compression field. This research uses the operations of the genetic algorithm for the enhancement of the performance of one of the popular compression method. Vector Quantization (VQ) method is selected in this work. After studying this method, new proposed algorithm for mixing the (GA) with this method was constructed and then the required programs for testing this algorithm was written. A good enhancement was recorded for the performance of the (VQ) method when mixed with the (GA). The proposed algorithm was tested by applying it on some sound data files. Some fidelity measures are calculated to evaluate the performance of the new proposed algorithm.

Research paper thumbnail of Tasks Scheduling in Private Cloud Based on Levels of Users

International Journal of Open Information Technologies, 2017

Nigeria is a pluralistic society. This is evident in ethnicity, religion and culture; three conce... more Nigeria is a pluralistic society. This is evident in ethnicity, religion and culture; three concepts that are intertwined and yet different. Most of the conflicts experienced in Nigeria are blamed on these concepts, especially religion. Nigerians do not freely discuss religion. It is a volatile subject to be discussed as a national issue. Institutions of learning shy away from studying religion as such. Religion, nonetheless, underpins and gives force to ethnicity and culture. Of the three dominant religions in Nigeria, Ancestral Religion cushions the missionary religions (Christianity and Islam). In their missionary character, they compete for sphere of influence and indoctrinate people unto fanaticism. The consequence is mutual hatred that often leads to the loss of lives and property. Religion is then seen as dysfunctional to development. The problem, however, is that people are not educated, formally and informally, on the possible contributions of religion to human development. Nigeria's tertiary institutions serve as the starting point. The paper concludes that the study of religion is indispensable for sustainable development in Nigeria. It recommends that for this type of development to be achieved, students of religion should be given a pride of place in Nigeria's politics and economy.

Research paper thumbnail of A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key

RAIRO - Theoretical Informatics and Applications, 2016

In the digital era, most types of transmitted data over the Internet are images. These images may... more In the digital era, most types of transmitted data over the Internet are images. These images may carry secret information. So, it became necessary to have an effective encryption system to hide information inside these images. The use of random and large-sized key represents the main factors that give the encryption system the required strength and give encrypted data more protection. This paper presents a non-traditional encryption algorithm that uses a large key size (256 bytes) = 2048 bits, to achieve a high degree of protection for the image. First, the algorithm represents the source image as a set of two-dimensional blocks of size 16 × 16 bytes and the secret key as a two-dimensional block of size 16 × 16 bytes. Second, transposition and substitution operations are implemented within each block of the image based on the extracted map of overlapped paths from the secret key block. Successive different keys are generated by using another way of implementation of the substitution and transposition operations in the secret key block. The recorded performance results, from the evaluation tests, have been compared with some well-known encryption algorithms and they proved that the proposed algorithm can be used effectively to protect images.

Research paper thumbnail of Word-based LSB Image Steganography

Steganography is the art and science of hiding important information by embedding message within ... more Steganography is the art and science of hiding important information by embedding message within other file. A new Least Significant Bit (LSB) steganography technique is presented in this work by treating the secret message based on its words content instead of its characters content. By using a specific small words dictionary by the sender and the receiver of the secret message, and representing each word in the secret message with an index in the words dictionary. Then embed these words indices, of the secret message, in the LSB of the pixels in the stego-image. The experimental results shown that the Word Based LSB technique will add more security to the secret message, reduces the distortion that will occur in the stego-image, increase the capability to hide very long secret message in a small stego-image, and minimize the time that is needed to hide and extract the secret message.

Research paper thumbnail of Genetic Algorithm For Multimedia Data Security

Research paper thumbnail of A Novel Encryption Method for Image Security

Management, 2012

Image encryption is one of the most methods of information hiding. A novel secure encryption meth... more Image encryption is one of the most methods of information hiding. A novel secure encryption method for image hiding is presented in this paper. The proposed method provides good confusion and diffusion properties that ensures high security due to mixing ...

Research paper thumbnail of Using DNA to Develop a Lightweight Symmetric Encryption Method to Encrypt the Data of IoT Devices

International Journal of Electronic Security and Digital Forensics

Research paper thumbnail of Message Segmentation to Enhance the Security of LSB Image Steganography

International Journal of Advanced Computer Science and Applications, 2012

Classic Least Significant Bit (LSB) steganography technique is the most used technique to hide se... more Classic Least Significant Bit (LSB) steganography technique is the most used technique to hide secret information in the least significant bit of the pixels in the stego-image. This paper proposed a technique by splitting the secret message into set of segments, that have same length (number of characters), and find the best LSBs of pixels in the stego-image that are matched to each segment. The main goal of this technique is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed technique gives good enhancement to the Classic Least Significant Bit (LSB) technique.

Research paper thumbnail of Image Steganography by Mapping Pixels to Letters

Journal of Computer Science, 2009

Problem statement: Steganography hides the very existence of a message so that if successful it g... more Problem statement: Steganography hides the very existence of a message so that if successful it generally attracts no suspicion at all. Using steganography, information can be hidden in carriers such as images, audio files, text files, videos and data transmissions. In this study, we proposed a new framework of an image steganography system to hide a digital text of a secret message. Approach: The main idea for this is to use enough number of bits from each pixel in an image (7-bits in this study) to map them to 26 alphabetic English characters ('a'…'z') with some special characters that are mostly using in writing a secret message. The main goal of this method, like any steganography techniques must do, is to hide a text of a secret message in the pixels of the image in such a manner that the human visual system is not able to distinguish between the original and the stego-image, but it can be easily performed by a specialized reader machine. Results: This method was implemented practically on different (long and short) messages and images. The carrier images that are used in the experiments of this research have no discernible change in it. Conclusion: The recorded experimental results showed that this proposed method can be used effectively in the field of steganography.

Research paper thumbnail of A Secret-Key Image Steganography Technique using Random Chain Codes

International Journal of Technology: IJ Tech, Jul 29, 2019

With the wide range use of digital communication technologies, the Internet has been commonly use... more With the wide range use of digital communication technologies, the Internet has been commonly used as a channel for transmitting various images. Steganography practises have been implemented for achieving such secure transmission. The main focus of steganography is data hiding where, digital images are utilized as the cover image. One of the image steganography techniques is based on LSB method, where the secret message bits are embedded sequentially in LSB of the bytes of the carrier image. This makes the hidden message vulnerable to detection by attackers. Many secret key image steganography techniques have been developed as alternative techniques to achieve a high level of security for the hidden secret message. But, these techniques failed to use the full capacity of the carrier image. In this paper, a secret key image steganography technique has been implemented using chains of a random sequence of indices (codes) of the bytes in the carrier image. These chains have been constructed based on the secret key used. This makes the hidden message more secure and difficult to depict by attackers. Furthermore, the proposed technique uses the full capacity of the carrier image. Visual and numerical tests have been conducted for the performance of the proposed technique, the recorded results proved it can be used effectively in the field of information hiding.

Research paper thumbnail of A New Image Steganography Based on Decimal-Digits Representation

Computer and Information Science, Oct 27, 2011

Steganography is the art and science of hiding important information by embedding message within ... more Steganography is the art and science of hiding important information by embedding message within other file. In this paper, a new technique to hide text message in image by using what is called image steganography. By representing the ASCII code decimal value of each character, in the secret message, as a set of separated single decimal-digit, also represent each decimal pixel value in the stego-image as a set of separated single decimal-digit. The technique creates a matching list between the decimal-digits of the characters in the secret message with the decimal-digits of the pixels in the stego-image. The technique compresses the created matching list to be as small as possible to embed it in the unused file space at the end of the stego-image file. The results show that our technique provides more security against visual attack because it does not make any changes in the pixel of the stego-image.

Research paper thumbnail of Raise the Strength of Cryptosystem Using Variety Effects

European Scientific Journal, ESJ, Apr 30, 2015

Nowadays, images became one of the most types of transmitted data through Internet. Some of these... more Nowadays, images became one of the most types of transmitted data through Internet. Some of these images carry secret information, therefore having an effective cryptosystem for hiding the information inside these images become an urgent need. Many traditional encryption methods are unable to achieve a high degree of protection for information. This paper presents nontraditional method for image encryption through applying substitution and transposition operations in different ways on both key and data. Series of (Linear and Circular), (Left, Right, Up and Down) rotation operations on (Bits and Bytes) of key and data are applied to make good confusion effects in the data. Moreover, XOR Boolean operations also applied on the key and data to make diffusion effects in the data. These two types of operations will produce a large set of keys. Using this large number of different keys in encrypting image will raise the strength of the encryption system used and achieve a high degree of protection for image. To test the security degree and performance of the encryption system, the system has been applied using different images and analyzing the results key space, key sensitivity, and statistical analysis and other criteria. From these tests, we can conclude that the encryption system can be used effectively to protect digital images.

Research paper thumbnail of Best-Job-First CPU Scheduling Algorithm

Information Technology Journal, Feb 1, 2007

Research paper thumbnail of A Tool for Compressing Images Based on Genetic Algorithm

Information Technology Journal, Mar 15, 2007

Research paper thumbnail of Image Encryption Using Genetic Algorithm

Information Technology Journal, Apr 15, 2006

Research paper thumbnail of Embedded key cryptosystem for cloud computing applications

As the internet1 and computer cloud are becoming increasingly dependable for almost all applicati... more As the internet1 and computer cloud are becoming increasingly dependable for almost all applications, data security issues are becoming crucial. In this paper, a new symmetric block cipher cryptographic algorithm is developed that would be suitable as a lightweight cryptosystem suiting database implementation for cloud computing platforms. Shannon principle of confusion and diffusion is achieved by the substitution, transposition, and mathematical operations conducted on block size of 64 bits. The private key is generated using the block content itself, and its content is embedded into the data blocks, different key is used for each block. The algorithm adopts two tables; one for the character set used and the other for the key elements generation. The confidentiality of these tables is responsible for the key strength. Experimental implementation proves the algorithm feasibility.

Research paper thumbnail of Image Encryption using a Binary Search Tree Structure-Based Key

International Journal of Computing and Digital Systems

Due to the ever-increasing cybercrime and hazards on digital information stored or in transit ove... more Due to the ever-increasing cybercrime and hazards on digital information stored or in transit over computer clouds and networks, so many encryption algorithms were developed and practically implemented. On the other hand, hackers and intruders keep on developing methods to break those algorithms. Hence, new methods are always sought and developed by researchers. A binary search tree (BST) is implemented in this paper to produce a new algorithm for image encryption. The BST is utilized to generate an encryption key that consists of two parts; local and global with flexible length capabilities that provide better security. Sharing all image contents to encrypt any byte of the source image helped to achieve Shannon's concept of diffusion and confusion. The experimental application of this algorithm has manifested a satisfactory security performance as compared with the widely used cryptographic systems such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES). These Comparisons included measurement of encryption time complexity, Peak Signal to Noise Ratio (PSNR), Entropy, encryption key space. Besides, the new method offers encryption key length flexibility and involvement of all image contents in its generation.

Research paper thumbnail of A Message Encryption Scheme inspired by Sudoku Puzzle (MESP)

International Journal of Information and Computer Security

Research paper thumbnail of Using the Binary Search Tree Structure as key to Encrypt Images

International Journal Of Computing and Digital System, Aug 23, 2021

Research paper thumbnail of Embedded key cryptosystem for cloud computing applications

Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

As the internet1 and computer cloud are becoming increasingly dependable for almost all applicati... more As the internet1 and computer cloud are becoming increasingly dependable for almost all applications, data security issues are becoming crucial. In this paper, a new symmetric block cipher cryptographic algorithm is developed that would be suitable as a lightweight cryptosystem suiting database implementation for cloud computing platforms. Shannon principle of confusion and diffusion is achieved by the substitution, transposition, and mathematical operations conducted on block size of 64 bits. The private key is generated using the block content itself, and its content is embedded into the data blocks, different key is used for each block. The algorithm adopts two tables; one for the character set used and the other for the key elements generation. The confidentiality of these tables is responsible for the key strength. Experimental implementation proves the algorithm feasibility.

Research paper thumbnail of Sound Data Compression Method Using Genetic Algorithm 1

The principal objective of this research is an adoption of the Genetic Algorithm (GA) for studyin... more The principal objective of this research is an adoption of the Genetic Algorithm (GA) for studying it firstly, and to stop over the operations which are introduced from the genetic algorithm.The candidate field for applying the operations of the genetic algorithm is the sound data compression field. This research uses the operations of the genetic algorithm for the enhancement of the performance of one of the popular compression method. Vector Quantization (VQ) method is selected in this work. After studying this method, new proposed algorithm for mixing the (GA) with this method was constructed and then the required programs for testing this algorithm was written. A good enhancement was recorded for the performance of the (VQ) method when mixed with the (GA). The proposed algorithm was tested by applying it on some sound data files. Some fidelity measures are calculated to evaluate the performance of the new proposed algorithm.

Research paper thumbnail of Tasks Scheduling in Private Cloud Based on Levels of Users

International Journal of Open Information Technologies, 2017

Nigeria is a pluralistic society. This is evident in ethnicity, religion and culture; three conce... more Nigeria is a pluralistic society. This is evident in ethnicity, religion and culture; three concepts that are intertwined and yet different. Most of the conflicts experienced in Nigeria are blamed on these concepts, especially religion. Nigerians do not freely discuss religion. It is a volatile subject to be discussed as a national issue. Institutions of learning shy away from studying religion as such. Religion, nonetheless, underpins and gives force to ethnicity and culture. Of the three dominant religions in Nigeria, Ancestral Religion cushions the missionary religions (Christianity and Islam). In their missionary character, they compete for sphere of influence and indoctrinate people unto fanaticism. The consequence is mutual hatred that often leads to the loss of lives and property. Religion is then seen as dysfunctional to development. The problem, however, is that people are not educated, formally and informally, on the possible contributions of religion to human development. Nigeria's tertiary institutions serve as the starting point. The paper concludes that the study of religion is indispensable for sustainable development in Nigeria. It recommends that for this type of development to be achieved, students of religion should be given a pride of place in Nigeria's politics and economy.

Research paper thumbnail of A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key

RAIRO - Theoretical Informatics and Applications, 2016

In the digital era, most types of transmitted data over the Internet are images. These images may... more In the digital era, most types of transmitted data over the Internet are images. These images may carry secret information. So, it became necessary to have an effective encryption system to hide information inside these images. The use of random and large-sized key represents the main factors that give the encryption system the required strength and give encrypted data more protection. This paper presents a non-traditional encryption algorithm that uses a large key size (256 bytes) = 2048 bits, to achieve a high degree of protection for the image. First, the algorithm represents the source image as a set of two-dimensional blocks of size 16 × 16 bytes and the secret key as a two-dimensional block of size 16 × 16 bytes. Second, transposition and substitution operations are implemented within each block of the image based on the extracted map of overlapped paths from the secret key block. Successive different keys are generated by using another way of implementation of the substitution and transposition operations in the secret key block. The recorded performance results, from the evaluation tests, have been compared with some well-known encryption algorithms and they proved that the proposed algorithm can be used effectively to protect images.

Research paper thumbnail of Word-based LSB Image Steganography

Steganography is the art and science of hiding important information by embedding message within ... more Steganography is the art and science of hiding important information by embedding message within other file. A new Least Significant Bit (LSB) steganography technique is presented in this work by treating the secret message based on its words content instead of its characters content. By using a specific small words dictionary by the sender and the receiver of the secret message, and representing each word in the secret message with an index in the words dictionary. Then embed these words indices, of the secret message, in the LSB of the pixels in the stego-image. The experimental results shown that the Word Based LSB technique will add more security to the secret message, reduces the distortion that will occur in the stego-image, increase the capability to hide very long secret message in a small stego-image, and minimize the time that is needed to hide and extract the secret message.

Research paper thumbnail of Genetic Algorithm For Multimedia Data Security

Research paper thumbnail of A Novel Encryption Method for Image Security

Management, 2012

Image encryption is one of the most methods of information hiding. A novel secure encryption meth... more Image encryption is one of the most methods of information hiding. A novel secure encryption method for image hiding is presented in this paper. The proposed method provides good confusion and diffusion properties that ensures high security due to mixing ...

Research paper thumbnail of Using DNA to Develop a Lightweight Symmetric Encryption Method to Encrypt the Data of IoT Devices

International Journal of Electronic Security and Digital Forensics

Research paper thumbnail of Message Segmentation to Enhance the Security of LSB Image Steganography

International Journal of Advanced Computer Science and Applications, 2012

Classic Least Significant Bit (LSB) steganography technique is the most used technique to hide se... more Classic Least Significant Bit (LSB) steganography technique is the most used technique to hide secret information in the least significant bit of the pixels in the stego-image. This paper proposed a technique by splitting the secret message into set of segments, that have same length (number of characters), and find the best LSBs of pixels in the stego-image that are matched to each segment. The main goal of this technique is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed technique gives good enhancement to the Classic Least Significant Bit (LSB) technique.

Research paper thumbnail of Image Steganography by Mapping Pixels to Letters

Journal of Computer Science, 2009

Problem statement: Steganography hides the very existence of a message so that if successful it g... more Problem statement: Steganography hides the very existence of a message so that if successful it generally attracts no suspicion at all. Using steganography, information can be hidden in carriers such as images, audio files, text files, videos and data transmissions. In this study, we proposed a new framework of an image steganography system to hide a digital text of a secret message. Approach: The main idea for this is to use enough number of bits from each pixel in an image (7-bits in this study) to map them to 26 alphabetic English characters ('a'…'z') with some special characters that are mostly using in writing a secret message. The main goal of this method, like any steganography techniques must do, is to hide a text of a secret message in the pixels of the image in such a manner that the human visual system is not able to distinguish between the original and the stego-image, but it can be easily performed by a specialized reader machine. Results: This method was implemented practically on different (long and short) messages and images. The carrier images that are used in the experiments of this research have no discernible change in it. Conclusion: The recorded experimental results showed that this proposed method can be used effectively in the field of steganography.

Research paper thumbnail of A Secret-Key Image Steganography Technique using Random Chain Codes

International Journal of Technology: IJ Tech, Jul 29, 2019

With the wide range use of digital communication technologies, the Internet has been commonly use... more With the wide range use of digital communication technologies, the Internet has been commonly used as a channel for transmitting various images. Steganography practises have been implemented for achieving such secure transmission. The main focus of steganography is data hiding where, digital images are utilized as the cover image. One of the image steganography techniques is based on LSB method, where the secret message bits are embedded sequentially in LSB of the bytes of the carrier image. This makes the hidden message vulnerable to detection by attackers. Many secret key image steganography techniques have been developed as alternative techniques to achieve a high level of security for the hidden secret message. But, these techniques failed to use the full capacity of the carrier image. In this paper, a secret key image steganography technique has been implemented using chains of a random sequence of indices (codes) of the bytes in the carrier image. These chains have been constructed based on the secret key used. This makes the hidden message more secure and difficult to depict by attackers. Furthermore, the proposed technique uses the full capacity of the carrier image. Visual and numerical tests have been conducted for the performance of the proposed technique, the recorded results proved it can be used effectively in the field of information hiding.

Research paper thumbnail of A New Image Steganography Based on Decimal-Digits Representation

Computer and Information Science, Oct 27, 2011

Steganography is the art and science of hiding important information by embedding message within ... more Steganography is the art and science of hiding important information by embedding message within other file. In this paper, a new technique to hide text message in image by using what is called image steganography. By representing the ASCII code decimal value of each character, in the secret message, as a set of separated single decimal-digit, also represent each decimal pixel value in the stego-image as a set of separated single decimal-digit. The technique creates a matching list between the decimal-digits of the characters in the secret message with the decimal-digits of the pixels in the stego-image. The technique compresses the created matching list to be as small as possible to embed it in the unused file space at the end of the stego-image file. The results show that our technique provides more security against visual attack because it does not make any changes in the pixel of the stego-image.