Improved Security Based on Combined Encryption and Steganography Techniques

被引:0
|
作者
Mocanu, Stefan [1 ]
Duluta, Andrei [1 ]
Merezeanu, Daniel [1 ]
Pietraru, Radu [1 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp Sci, Splaiul Independentei 313, Bucharest 060042, Romania
来源
STUDIES IN INFORMATICS AND CONTROL | 2017年 / 26卷 / 01期
关键词
Digital steganography; encryption; pseudo random matrix; message hiding;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For some people a science, for other people just an art, steganography is in fact an ancient method of embedding a message into an apparently uninteresting carrier. Aiming to protect information, steganography is considered to be a close relative of encryption although they have different approaches. While encryption scrambles the message based on a certain algorithm so it can't be understood by anyone that does not hold the unscrambling key, steganography works on hiding the message without the need to deteriorate it. Minor alteration of the carrier file is accepted since steganography does not affect its useful content. Actually, steganography exploits file redundancy, file headers or, in case of multimedia content, replaces information that can't be used or perceived by the human eyes or ears. In this paper, a combination of image based steganography with encryption is presented. The encryption and decryption are based on two different files in which, by steganographic means, important information is hidden. The original message (the secret message) can be restored only if both files arrive safe at destination. There are no constraints regarding the image file types. The most important contribution resides in how the original information is encrypted and embedded into different graphic files, sent to the destination through different channels and then restored. Comparative performance tests were performed.
引用
收藏
页码:115 / 126
页数:12
相关论文
共 50 条
  • [41] Improved broadcast encryption schemes with enhanced security
    Ke, Lishan
    Yi, Zongxiang
    Ren, Yan
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (01) : 121 - 129
  • [42] Improved broadcast encryption schemes with enhanced security
    Lishan Ke
    Zongxiang Yi
    Yan Ren
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 121 - 129
  • [43] An Advanced Image Encryption Standard Providing Dual Security: encryption using Hill Cipher & RGB image steganography
    Debnath, Dipanwita
    Deb, Suman
    Kar, Nirmalya
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE), 2015, : 178 - 183
  • [44] Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques
    Rani, M. Mary Shanthi
    Mary, G. Germine
    Euphrasia, K. Rosemary
    [J]. COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 403 - 412
  • [45] A New Approach for Information Security using an Improved Steganography Technique
    Juneja, Mamta
    Sandhu, Parvinder Singh
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2013, 9 (03): : 405 - 424
  • [46] Image Steganography Method Using K-Means Clustering and Encryption Techniques
    Pillai, Bhagya
    Mounika, Mundra
    Rao, Pooja J.
    Sriram, Padmamala
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1206 - 1211
  • [47] Highly Improved DNA Based Steganography
    Malathi, P.
    Manoaj, M.
    Manoj, R.
    Raghavan, Vaikunth
    Vinodhini, R. E.
    [J]. 7TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2017), 2017, 115 : 651 - 659
  • [48] Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment
    Abunadi, Ibrahim
    Mengash, Hanan Abdullah
    Alotaibi, Saud S.
    Asiri, Mashael M.
    Hamza, Manar Ahmed
    Zamani, Abu Sarwar
    Motwakel, Abdelwahed
    Yaseen, Ishfaq
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (08):
  • [49] Enhanced Security Through Integrated Morse Code Encryption and LSB Steganography in Digital Communications
    Olewi, Huda Ismail
    Msallam, Mohammed Majid
    Salim, Sarah Kareem
    Al-Behadili, Hasanain A. H.
    [J]. TRAITEMENT DU SIGNAL, 2024, 41 (01) : 519 - 524
  • [50] An Enhanced Steganographic Model Based on DWT Combined with Encryption and Error Correction Techniques
    Yasin, Adwan
    Sabha, Muath
    Shehab, Nizar
    Yasin, Mariam
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (12) : 49 - 55