Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel

被引:3
|
作者
Naser, Mohammed Abdullah [1 ]
Al-alak, Saif M. Kh. [1 ]
Hussein, Ahmed Mohammed [1 ]
Jawad, Majid Jabbar [1 ]
机构
[1] Univ Babylon, Dept Comp Sci, Coll Sci Women, Babylon, Iraq
关键词
Information Security; Least Significant Bit (LSB); Randomness Public Network Channel; RC4; Video Steganography;
D O I
10.21123/bsj.2022.6142
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
引用
收藏
页码:1362 / 1368
页数:7
相关论文
共 50 条
  • [21] Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing
    Kim, Won-Bin
    Kim, Su-Hyun
    Seo, Daehee
    Lee, Im-Yeong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [22] Secure QR-Code Based Message Sharing System Using Cryptography and Steganography
    Mendhe, Abhijeet
    Gupta, Deepak Kumar
    Sharma, Krishna Pal
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 188 - 191
  • [23] Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding
    Fredy Varghese
    P. Sasikala
    Wireless Personal Communications, 2023, 130 : 551 - 578
  • [24] Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding
    Varghese, Fredy
    Sasikala, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (01) : 551 - 578
  • [25] A novel audio steganography technique integrated with a symmetric cryptography: a protection mechanism for secure data outsourcing
    PrakashRao, Shirole Rashmi
    Jyothi, K.
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2021, 24 (05) : 530 - 537
  • [26] System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos
    Flores Siordia, Octavio
    Estrada Gutierrez, Juan Carlos
    Padilla Leyferman, Carlos Eduardo
    Aguilar Santiago, Jorge
    Jimenez Rodriguez, Maricela
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [27] Efficient Combination of RSA Cryptography, Lossy, and Lossless Compression Steganography Techniques to Hide Data
    AbdelWahab, Osama F.
    Hussein, Aziza I.
    Hamed, Hesham F. A.
    Kelash, Hamdy M.
    Khalaf, Ashraf A. M.
    LEARNING AND TECHNOLOGY CONFERENCE 2020; BEYOND 5G: PAVING THE WAY FOR 6G, 2021, 182 : 5 - 12
  • [28] Visual Cryptography and Steganography Based on Intensity Transformations and Dispersed Dot Halftoning Techniques
    Liu, Ping Feng
    Li, Fang Yu
    Shu, Hou
    Dong, Zhi Hong
    INTERNATIONAL ACADEMIC CONFERENCE ON THE INFORMATION SCIENCE AND COMMUNICATION ENGINEERING (ISCE 2014), 2014, : 534 - 539
  • [29] Secure Data Transmission Protocol based on Quantum Cryptography
    Hong, Joonmo
    Kang, BooJoong
    Kim, Hye Seon
    Chang, Peter
    Im, Eul Gyu
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4989 - 5002
  • [30] A Provable Secure Scheme Based on Certificateless Public Key Cryptography
    Wang, Yanhong
    Ye, Junyao
    Ye, Junyao
    3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION ENGINEERING (CSIE 2015), 2015, : 14 - 18