Enhancing Internet Data Security: A Fusion of Cryptography, Steganography, and Machine Learning Techniques

被引:0
作者
Rashid, Omar Fitian [1 ]
Subhi, Mohammed Ahmed [2 ,3 ]
Hussein, Marwa Khudhur [4 ]
Mahdi, Mohammed Najah [5 ]
机构
[1] Univ Baghdad, Coll Sci, Dept Geol, Baghdad, Iraq
[2] Minist Higher Educ & Sci Res, Directorate Private Univ Educ, Dept Planning, Baghdad, Iraq
[3] Univ Baghdad, Dept Construct & Projects, Baghdad, Iraq
[4] Med Tech Univ, Balad Tech Inst, Baghdad, Iraq
[5] Dublin City Univ, ADAPT Ctr, Sch Comp, Dublin, Ireland
关键词
DNA cryptography; Decryption; Machine learning; Steganography; Security; Encryption;
D O I
10.21123/bsj.2024.10371
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cryptography and steganography play critical roles in ensuring the security of network communications. Combining these methods holds great potential for safeguarding information transmitted over the internet. DNA Cryptography, a modern and robust technique, leverages the unique properties of DNA for secure data handling. The increasing of cyber threats has made it necessary to propose a new secure communication method to block unauthorized access to the sending information. This paper introduces an innovative system that integrates cryptography, steganography, and machine learning techniques to enhance data transfer security over the Internet. The system unfolds in six steps to encrypt and hide text. The initial step involves using the Caesar cipher to encode the original text. This is followed by the conversion of the text into DNA bases. Subsequent steps include the conversion of DNA bases to ASCII format and further transformation into binary numbers. The fifth step introduces a dynamic element by shifting binary numbers using a random key. The final step involves covertly embedding these binary numbers (ciphertext) within an image. Beyond traditional metrics, machine learning elements have been incorporated to elevate the system's performance. Performance evaluation was conducted across three standard images with varying data sizes, demonstrating the system's effectiveness. The proposed system showcased rapid cryptography times, with encryption and decryption times of 2.802 ms and 3.388 ms, respectively. The integration of machine learning techniques enriches the system's capabilities, presenting a compelling solution for secure and efficient data transfer over the Internet.
引用
收藏
页码:1005 / 1015
页数:12
相关论文
共 24 条
  • [1] Akiwate B, 2018, PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), P223, DOI 10.1109/CTEMS.2018.8769267
  • [2] A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
    Al-Hassani, Mustafa Dhiaa
    [J]. BAGHDAD SCIENCE JOURNAL, 2022, 19 (04) : 905 - 913
  • [3] Image cyberbullying detection and recognition using transfer deep machine learning
    Almomani A.
    Nahar K.
    Alauthman M.
    Al-Betar M.A.
    Yaseen Q.
    Gupta B.B.
    [J]. International Journal of Cognitive Computing in Engineering, 2024, 5 : 14 - 26
  • [4] Generation of random sequences using DNA cryptography for OTP encryption
    Beggas, Fairouz
    Lounici, Ali
    [J]. BIOSYSTEMS, 2023, 234
  • [5] Bhimani P., 2018, IJCERT, V5, P187, DOI [10.22362/ijcert/2018/v5/i6/v5i604, DOI 10.22362/IJCERT/2018/V5/I6/V5I604]
  • [6] Constructive image steganography using example-based weighted color transfer
    Hsieh, Ku-Sung
    Wang, Chung-Ming
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
  • [7] Application of a human-centered design for embedded machine learning model to develop data labeling software with nurses: Human-to-Artificial Intelligence (H2AI)
    Kaduwela, Naomi A.
    Horner, Susan
    Dadar, Priyansh
    Manworren, Renee C. B.
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2024, 183
  • [8] Kataria S, 2013, 2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), P612, DOI 10.1109/ICIIP.2013.6707666
  • [9] Kaundal AK, 2014, IJICT, V4, P693
  • [10] Mohammed MH, 2018, 2018 PROCEEDINGS OF THE INTERNATIONAL JAPAN-AFRICA CONFERENCE ON ELECTRONICS, COMMUNICATIONS, AND COMPUTATIONS (JAC-ECC 2018), P79, DOI 10.1109/JEC-ECC.2018.8679564