Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel

被引:3
|
作者
Naser, Mohammed Abdullah [1 ]
Al-alak, Saif M. Kh. [1 ]
Hussein, Ahmed Mohammed [1 ]
Jawad, Majid Jabbar [1 ]
机构
[1] Univ Babylon, Dept Comp Sci, Coll Sci Women, Babylon, Iraq
关键词
Information Security; Least Significant Bit (LSB); Randomness Public Network Channel; RC4; Video Steganography;
D O I
10.21123/bsj.2022.6142
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
引用
收藏
页码:1362 / 1368
页数:7
相关论文
共 50 条
  • [31] An Efficient Secure Data Transmission Based on Visual Cryptography
    Jabi, Rubeena
    Patel, Punyaban
    Dubey, Deepty
    2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [32] A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure
    Namasudra, Suyel
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [33] A public static agreement key based cryptography for secure data transmission in WSN based smart environment application
    Kumar, M. Satheesh
    Kumar, P. Ganesh
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 246
  • [34] Provably Secure Public-Key Steganography Based on Admissible Encoding
    Zhang, Xin
    Chen, Kejiang
    Zhao, Na
    Zhang, Weiming
    Yu, Nenghai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3161 - 3175
  • [35] PSO-based steganography scheme using DWT-SVD and cryptography techniques for cloud data confidentiality and integrity
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Journal of Computers (Taiwan), 2019, 30 (06) : 31 - 45
  • [36] An Efficient Sound and Data Steganography Based Secure Authentication System
    Datta, Debajit
    Garg, Lalit
    Srinivasan, Kathiravan
    Inoue, Atsushi
    Reddy, G. Thippa
    Reddy, M. Praveen Kumar
    Ramesh, K.
    Nasser, Nidal
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (01): : 723 - 751
  • [37] Secure Data Communication and Cryptography Based on DNA Based Message Encoding
    Majumder, Atanu
    Majumdar, Abhishek
    Podder, Tanusree
    Kar, Nirmalya
    Sharma, Meenakshi
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 360 - 363
  • [38] ID-Based Cryptography for Secure Cloud Data Storage
    Kaaniche, Nesrine
    Boudguiga, Aymen
    Laurent, Maryline
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 375 - 382
  • [39] Cloud based secure multimedia medical data using optimized convolutional neural network and cryptography mechanism
    Swetha, Gadde
    Janaki, Karur
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (23) : 33971 - 34007
  • [40] New High Secure Network Steganography Method Based on Packet Length
    Sabeti, Vajiheh
    Shoaei, Minoo
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (01): : 24 - 34