Improved Security Based on Combined Encryption and Steganography Techniques

被引:0
|
作者
Mocanu, Stefan [1 ]
Duluta, Andrei [1 ]
Merezeanu, Daniel [1 ]
Pietraru, Radu [1 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp Sci, Splaiul Independentei 313, Bucharest 060042, Romania
来源
STUDIES IN INFORMATICS AND CONTROL | 2017年 / 26卷 / 01期
关键词
Digital steganography; encryption; pseudo random matrix; message hiding;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For some people a science, for other people just an art, steganography is in fact an ancient method of embedding a message into an apparently uninteresting carrier. Aiming to protect information, steganography is considered to be a close relative of encryption although they have different approaches. While encryption scrambles the message based on a certain algorithm so it can't be understood by anyone that does not hold the unscrambling key, steganography works on hiding the message without the need to deteriorate it. Minor alteration of the carrier file is accepted since steganography does not affect its useful content. Actually, steganography exploits file redundancy, file headers or, in case of multimedia content, replaces information that can't be used or perceived by the human eyes or ears. In this paper, a combination of image based steganography with encryption is presented. The encryption and decryption are based on two different files in which, by steganographic means, important information is hidden. The original message (the secret message) can be restored only if both files arrive safe at destination. There are no constraints regarding the image file types. The most important contribution resides in how the original information is encrypted and embedded into different graphic files, sent to the destination through different channels and then restored. Comparative performance tests were performed.
引用
收藏
页码:115 / 126
页数:12
相关论文
共 50 条
  • [31] Analysis of various data security techniques of steganography: A survey
    Dhawan, Sachin
    Gupta, Rashmi
    [J]. INFORMATION SECURITY JOURNAL, 2021, 30 (02): : 63 - 87
  • [32] Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images
    Gladwin, S. Joseph
    Gowthami, Pasumarthi Lakshmi
    [J]. 2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SIGNAL PROCESSING (AISP), 2020,
  • [33] Enhancing Security of Transmitted Data by Improved Steganography Method
    Basahel, Abdullah M.
    Yamin, Mohammad
    Sen, Adnan Ahmed Abi
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (04): : 239 - 244
  • [34] Three Step Data Security Model for Cloud Computing based on RSA and Steganography Techniques
    Pant, Vinay Kumar
    Prakash, Jyoti
    Asthana, Amit
    [J]. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 490 - 494
  • [35] An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images
    S. Rathika
    R. Gayathri
    [J]. Multimedia Tools and Applications, 2023, 82 : 47235 - 47252
  • [36] Security techniques using Enhancement of AES Encryption
    Meetender
    Kashyap, Nirbhay
    Aggarwal, Archit
    Choudhury, Tanupriya
    [J]. PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 468 - 472
  • [37] An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images
    Rathika, S.
    Gayathri, R.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (30) : 47235 - 47252
  • [38] Vehicle Security Encryption Based on Unlicensed Encryption
    Huang, Haomin
    Song, Jing
    Xu, Zhijia
    Ding, Xiaoke
    Deng, Wei
    [J]. MIPPR 2017: REMOTE SENSING IMAGE PROCESSING, GEOGRAPHIC INFORMATION SYSTEMS, AND OTHER APPLICATIONS, 2018, 10611
  • [39] Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption
    Attaullah
    Javeed, Adnan
    Shah, Tariq
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) : 31467 - 31484
  • [40] Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption
    Adnan Attaullah
    Tariq Javeed
    [J]. Multimedia Tools and Applications, 2019, 78 : 31467 - 31484