A Novel Secure Communication Protocol Combining Steganography and Cryptography

被引:14
|
作者
Song, Shouchao [1 ,2 ]
Zhang, Jie [2 ]
Liao, Xin [1 ]
Du, Jiao [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China
来源
CEIS 2011 | 2011年 / 15卷
基金
中国国家自然科学基金;
关键词
Information security; Secure communication; LSB matching; Boolean functions; HIDING DATA; LSB; IMAGES;
D O I
10.1016/j.proeng.2011.08.521
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new secure communication protocol that combines steganography and cryptography techniques organically is proposed. It is based on the LSB matching method and the well-developed Boolean functions in stream ciphers. The cover media employed focuses on grayscale images, and the Boolean function is used for encryption and controlling the pseudo-random increment or decrement of LSB. Unlike the existing methods of doing encrypting and hiding separately, this protocol is one-stop, accomplishing them all at once. Therefore, it needs less computation than the existing methods do while maintaining high secure quality. To our knowledge, this is the first secure protocol of this kind. And this method not only is easy to be implemented, but also has almost optimal embedding ratio, what's more, it is highly robust to resist regular steganalysis, such as RS analysis, GPC analysis,chi(2)-analysis. (c) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of [CEIS 2011]
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Secret Communication Combining Cryptography and Steganography
    Chatterjee, Ayan
    Das, Asit Kumar
    [J]. PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, PROCEEDINGS OF ICACIE 2016, VOLUME 1, 2018, 563 : 281 - 291
  • [2] Combining Cryptography with Steganography
    Gencoglu, Muharrem Tuncay
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTATIONAL MATHEMATICS AND ENGINEERING SCIENCES (CMES2017), 2017, 13
  • [3] A Novel Protocol using Quantum Cryptography for Secure Communication in 802.11 Networks
    Wijesekera, Shirantha
    Huang, Xu
    Sharma, Dharmendra
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS & WORKSHOPS, 2009, : 693 - 698
  • [4] A Novel Protocol using Quantum Cryptography for Secure Communication in 802.11 Networks
    Wijesekera, Shirantha
    Huang, Xu
    Sharma, Dharmendra
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS & WORKSHOPS, 2009, : 66 - 71
  • [5] A Secure Text Communication Scheme Based on Combination of Compression, Cryptography, and Steganography
    Saneja, Kirti
    Kumar, Mukesh
    Sharma, Pallavi
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 205 - 214
  • [6] Secure Communication across the Internet by Encrypting the Data using Cryptography and Image Steganography
    Rajesh, P.
    Alam, Mansoor
    Tahernezhadi, Mansour
    Kumar, T. Ravi
    Rajesh, Vikram Phaneendra
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (10) : 454 - 458
  • [7] A Novel Approach to Secure Communication using Audio Steganography
    Srivastava, Mayank
    Rafiq, Mohd Qasim
    [J]. MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 963 - +
  • [8] Novel Protocol for Quantum Cryptography of Secure in Wireless Communications
    Huang, Xu
    Wijesekera, Shirantha
    Sharma, Dharmendra
    [J]. 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,, 2009, : 913 - 918
  • [9] Secure data communication using protocol steganography in IPv6
    Bobade, Sandip
    Goudar, Rajeshawari
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 275 - 279
  • [10] Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques
    Pekerti, Albertus Anugerah
    Sasongko, Arif
    Indrayanto, Adi
    [J]. IEEE ACCESS, 2024, 12 : 75146 - 75168